INSY 4312 - Chapter 5.4
Of the following security zones, which one can serve as a buffer network between a private secured network and the untrusted internet?
DMZ
Which of the following is likely to be located in a DMZ?
FTP Server
Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks.
Bstion or sacrificial host
You have used firewalls to create a demilitarized zone. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to best protect the servers?
Put the web server inside the DMZ, and put the db server on the private network
You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use?
Use firewalls to create a DMZ. Place the web server inside the DMZ and the private network behind the DMZ
In which of the following situations would you most likely implement a demilitarized zone (DMZ)?
You want to protect a public web server from attack.