COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
DMZ
|
|
NAT
|
|
VLAN
|
|
PLC
|
Detailed explanation-1: -DMZs function as a buffer zone between the public internet and the private network. The DMZ subnet is deployed between two firewalls. All inbound network packets are then screened using a firewall or other security appliance before they arrive at the servers hosted in the DMZ.
Detailed explanation-2: -The DMZ network serves as a buffer between the internet and the private network of an organization. It is isolated by a security gateway like a firewall that filters traffic between the DMZ and LAN. The default DMZ server is secured by another gateway that filters the incoming traffic from external networks.
Detailed explanation-3: -Purpose of a DMZ The DMZ network exists to protect the hosts most vulnerable to attack. These hosts usually involve services that extend to users outside of the local area network, the most common examples being email, web servers, and DNS servers.
Detailed explanation-4: -The purpose of the DMZ is to protect both sides from attack. If North Korea was going to attack South Korea, they would have to pass through this tract of land, giving South Korea a short amount of time to alert that an attack was imminent. Additionally, this allows both sides to better prepare their defenses.
Detailed explanation-5: -All publicly-accessible hosts are inside the DMZ. A second firewall protects the private network from the internet.