Chapter 5.2 Demilitarized Zones

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Screened subnet

A subnet protected by two firewalls; an external firewall is connected to the internet and an internal firewall is connected to a private network.

Bastion or Sacrificial Host

Any host that is exposed to attack and that has been hardened or fortified against those attacks.

Which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks? Kernel proxy Multi-homed Circuit proxy Bastion or sacrificial host

Bastion or sacrificial host

Which of the following is the MOST likely to happen if the firewall managing traffic into the DMZ fails? The LAN is compromised, but the DMZ stays protected. Nothing will happen - all devices will stay protected. Only the servers in the DMZ are compromised, but the LAN will stay protected. All devices in the DMZ and LAN will be compromised.

Only the servers in the DMZ are compromised, but the LAN will stay protected.

You have used firewalls to create a demilitarized zone. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to best protect the servers? (Select two.) Put the database server inside the DMZ. Put the database server on the private network. Put the web server on the private network. Put the web server inside the DMZ.

Put the database server on the private network Put the web server inside the DMZ.

Of the following security zones, which one can serve as a buffer network between a private secured network and the untrusted internet? DMZ Intranet Padded cell Extranet

DMZ

What needs to be configured on a firewall to allow traffic directed to the public resource in the DMZ? Packet filters VPN FTP Subnet

Packet filters

How many network interfaces does a dual-homed gateway typically have? 1 3 2 4

3

Which of the following is another name for a firewall that performs router functions? Screened-host gateway Screening router Screened subnet Dual-homed gateway

Screening router

Screening Router

The router that is most external to your network and closest to the internet.

Packet filters

on the firewall allow traffic directed to the public resources inside the DMZ. Packet filters also prevent unauthorized traffic from reaching the private network.

Demilitarized Zone (DMZ)

A buffer network (or subnet) that is located between a private network and an untrusted network, such as the internet.

Screened Host Gateway

A device that resides within the DMZ, requiring users to authenticate in order to access resources within the DMZ or the intranet.

Duel-Homed Gateway

A firewall device that typically has three network interfaces: one connected to the internet, one connected to the public subnet, and one connected to the private network.

You have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use? Use a single firewall. Put the web server in front of the firewall and the private network behind the firewall. Use firewalls to create a DMZ. Place the web server and the private network inside the DMZ. Use firewalls to create a DMZ. Place the web server inside the DMZ and the private network behind the DMZ. Use a single firewall. Put the web server and the private network behind the firewall.

Use firewalls to create a DMZ. Place the web server inside the DMZ and the private network behind the DMZ.

Which of the following is the BEST solution to allow access to private resources from the internet? Packet filters Subnet FTP VPN

VPN

In which of the following situations would you most likely implement a demilitarized zone (DMZ)? You want to detect and respond to attacks in real time. You want internet users to see a single IP address when accessing your company network. You want to encrypt data sent between two hosts using the internet. You want to protect a public web server from attack.

You want to protect a public web server from attack.


Set pelajaran terkait

Maternity Exam 2 Practice Questions 2 (main)

View Set

Russia and Its Neighbors (Russia Study Set)

View Set

History 1112 chapter 16 practice

View Set

Special Education: Preschool and Early Childhood Praxis 5691

View Set