6.3.5 Screened Subnets
What do you need to configure on a firewall to allow traffic directed to the public resources on the screened subnet?
Packet filters
You are managing a network and have used firewalls to create a screened subnet. You have a web server that internet users need to access. It must communicate with a database server to retrieve product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two.)
Put the database server on the private network. Put the web server inside the screened subnet.
Which of the following can serve as a buffer zone between a private, secured network and an untrusted network?
Screened subnet
You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to the internet users. Which solution should you use?
Use firewalls to create a screened subnet. Place the web server inside the screened subnet and the private network behind the screened subnet.
Which of the following is the BEST solution to allow access to private resources from the internet?
VPN
In which of the following situations would you MOST likely implement a screened subnet?
You want to protect a public web server from attack.
How many network interfaces does a dual-homed gateway typically have?
three
Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?
Bastion
Which of the following uses access control lists (ACLs) to filter packets as a form of security?
Screened router
Which of the following is another name for a firewall that performs router functions?
Screening router