Briefly describe a demilitarized zone (DMZ).

What will be an ideal response?


A demilitarized zone (DMZ) is a network segment carved out by normally two routers-with firewalls-to provide a special place (a zone) on the network for any servers that need to be publicly accessible from the Internet. By definition, a DMZ uses network segmentation as a mitigation technique against attacks on the network. The most common DMZ design is to create a DMZ by using two routers with firewalls to create a perimeter network. With a perimeter network, the two firewalls carve out areas with different levels of trust.
 

Computer Science & Information Technology

You might also like to view...

The ifstream class is derived from the __________ class.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Select the EAP protocol that uses digital certificates for authentication?

A. EAP-MSCHAPv2 B. EAP-AKA C. EAP-FAST D. EAP-TLS

Computer Science & Information Technology

Which of the following is NOT true of macro names?

A. The only punctuation they can contain is the underscore character. B. They can contain both numbers and letters. C. They can be up to 255 characters long. D. They can contain spaces.

Computer Science & Information Technology

Two users share the same Windows 7 computer. The first user creates a document intended to be used by both users, and then logs off. The second user logs on and types the name of the document in the Start menu, but the document is not found. Which of the following is the problem?

A. The document is set to hidden. B. The document is locked. C. The document was saved as a system document. D. The document is owned by the first user

Computer Science & Information Technology