6.4 Demilitarized Zones
Which of the following is likely to be located in a DMZ?
FTP Server
You have used firewalls to create a demilitarized zone. You have a Web server that needs to be accessible to Internet users. The Web server must communicate with a database server for retrieving product, customer and order information. How should you place devices on the network to best protect the servers?(Select two.)
Put the database server on the Private network AND put the Web server inside the DMZ
Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the Internet through airport and hotel networks. You are concerned that these computers will pick up viruses that could spread to your private network. You would like to implement a solution that prevents the laptops from connecting to your network unless anti-virus software and the latest operating system patches have been installed. Which solution should you use?
NAC
Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?
Bastion or sacrificial host
Of the following security zones, which one can serve as a buffer network between a private secured network and the untrusted Internet?
DMZ
You have a company network that is connected to the Internet. You want all users to have Internet access, but need to protect your private network and users. You also need to make a Web server publicly available to Internet users. Which solution should you use?
Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ.
In which of the following situations would you most likely implement a demilitarized zone(DMZ)?
You want to protect a public Web server from attack