Briefly describe a demilitarized zone (DMZ).
What will be an ideal response?
A demilitarized zone (DMZ) is a network segment carved out by normally two routers-with firewalls-to provide a special place (a zone) on the network for any servers that need to be publicly accessible from the Internet. By definition, a DMZ uses network segmentation as a mitigation technique against attacks on the network. The most common DMZ design is to create a DMZ by using two routers with firewalls to create a perimeter network. With a perimeter network, the two firewalls carve out areas with different levels of trust.
You might also like to view...
The ifstream class is derived from the __________ class.
Fill in the blank(s) with the appropriate word(s).
Select the EAP protocol that uses digital certificates for authentication?
A. EAP-MSCHAPv2 B. EAP-AKA C. EAP-FAST D. EAP-TLS
Which of the following is NOT true of macro names?
A. The only punctuation they can contain is the underscore character. B. They can contain both numbers and letters. C. They can be up to 255 characters long. D. They can contain spaces.
Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?
A. The document is set to hidden. B. The document is locked. C. The document was saved as a system document. D. The document is owned by the first user