A security administrator is configuring a new network segment, which contains devices that will be accessed by external users, such as web and FTP server.Which of the following represents the MOST secure way to configure the new network segment?
A. The segment should be placed on a separate VLAN, and the firewall rules should be configured to allow external traffic.
B. The segment should be placed in the existing internal VLAN to allow internal traffic only.
C. The segment should be placed on an intranet, and the firewall rules should be configured to allow external traffic.
D. The segment should be placed on an extranet, and the firewall rules should be configured to allow both internal and external traffic.
Answer: D. The segment should be placed on an extranet, and the firewall rules should be configured to allow both internal and external traffic.
You might also like to view...
A built-in ____ can find dynamic synonyms for any word you select.
A. spelling checker B. thesaurus C. grammar checker D. dictionary
A ________ has a screen that swivels to create a tablet
A) convertible notebook computer B) Mac computer C) tablet computer D) netbook
Briefly explain the consequences of having a dirty fiber connector.
What will be an ideal response?
Case Based Critical Thinking ? Case 1 ? The Photo ER is a business that specializes in fixing photographs. Tharch Trio, owner and founder of Photo ER, specializes in delicate photo surgery and has made quite a name for himself. He was recently interviewed by a national photography journal about his work and his business. When an image contains more content than is needed, what does Tharch suggest?
A. Build several masking layers B. Move the image to the bottom layer C. Crop out the unnecessary imagery D. Tweak the image with a lighting effect to bring out the main section of the composition