5.4
of the following security zones, which ones can serve as a buffer network between a private secured network and the untrusted internet?
DMZ
which of the following is likely to be located in a DMZ
FTP server
in which of the following situations would you most likely implement a DMZ?
you want to encrypt a public web server from attack
you have used firewalls to create a DMZ. you have a web server that needs to be publicly accessible to internet users. the web server must communicate with a database server for retrieving product, customer, and order info. how should you place devices on the network to best protect the servers?
-put the web server inside the DMZ -put the database server on the private network
which of the following terms describes a network device that is exposed to attacks and has been hardened against these attacks?
Bastion or sacrificial host
you have a company network that is connected to the internet. you want all users to have internet access, but you need to protect your private network and users. you also need to make a web server publicly available to the internet users. which solution should you use?
use firewalls to create DMZ. place the web server inside the DMZ and the private network behind the DMZ