A ____ topology works like a single-homed bastion topology, except that it has two network adapter cards in it and two IP addresses, one for each network it is connected to.
A. demilitarized zone
B. single-router zone
C. packet-filtering router
D. dual-homed bastion
Answer: D
You might also like to view...
What term is used to describe the construction and management of a portfolio of projects that make a maximum contribution to an organization's overall goals and objectives?
A. Enterprise portfolio management B. Portfolio enterprise architecture C. Project portfolio management D. Project portfolio architecture
Pure time-division multiplexing uses the bandwidth of the link most efficiently when only a few of the connected users are communicating.
a. True b. False
Outline the main difference between TLS and XML security. Explain why XML is particularly suitable for the role it plays, in terms of these differences.
What will be an ideal response?
File protection based on access permissions is provided by a mechanism that prevents users from accessing each others’ files when they are not logged on as the owner of a file. As the owner of a file, you can attach certain access rights to the file that dictate who can and cannot access it for various types of file operations. This scheme is based on the types of users, the types of access permissions, and the types of operations allowed on a file under LINUX. Without such a protection scheme, users can access each others’ files because the LINUX file system structure (see Figure 7.2) has a single root from which hang all the files in the system. The number of protection bits needed to implement this scheme is equal to the product of the number of types of users and the number of types of
What will be an ideal response?