INSY 4312 Ch5 (4)
Which of the following is likely to be located in a DMZ?
FTP server
You have used firewalls to create a demilitarized zone.How should you place devices on the network to best protect the servers?
Put the web server inside the DMZ and put the database server on the private network
Of the following security zones, which one can serve as a buffer network between a private secured network and the untrusted internet?
DMZ
Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?
Bastion or sacrificial host
You have a company that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users.Which solution should you use?
Use firewalls to create a DMZ. Place a web server inside the DMZ and a private network behind the DMZ
In which of the following situations would you most likely implement a DMZ?
You want to protect a public web server from attack.