5.2.5

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?

Bastion or sacrificial host

Of the following security zones, which one can serve as a buffer network between a private secured network and the untrusted internet?

DMZ

Which of the following is the MOST likely to happen if the firewall managing traffic into the DMZ fails?

Only the servers in the DMZ are compromised, but the LAN will stay protected.

You have used firewalls to create a demilitarized zone. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two.)

Put the database server on the private network. Put the web server inside the DMZ.

What needs to be configured on a firewall to allow traffic directed to the public resource in the DMZ?

Packet filters

How many network interfaces does a dual-homed gateway typically have?

3

Which of the following is another name for a firewall that performs router functions?

Screening router

Which of the following is the BEST solution to allow access to private resources from the internet?

VPN

You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use?

Use firewalls to create a DMZ. Place the web server inside the DMZ and the private network behind the DMZ.

In which of the following situations would you most likely implement a demilitarized zone (DMZ)?

You want to protect a public web server from attack.


Conjuntos de estudio relacionados

Exam 4: Social Cognition and Attitudes

View Set

Microsoft Certified Azure Fundamentals Exam (AZ-900)

View Set

BUS111 Chapter 5 Electronic Messages and Memos

View Set

CH:34 Clients with Immune-Mediated Disorders

View Set

Additive and Destructive Conditions

View Set