following doing these possible steps, the reverse proxy forwards the validated request to by far the most correct server behind it. the net server procedures the ask for and generates the reaction (webpage articles), https://mattiewyqz029878.dsiblogger.com/63342089/about-what-is-cyber-attack