FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What type of configuration creates a DMZ between two firewalls?
A
three-leg perimeter
B
basic
C
back to back
D
perimeter
Explanation: 

Detailed explanation-1: -The more secure approach to creating a DMZ network is a dual-firewall configuration, in which two firewalls are deployed with the DMZ network positioned between them. The first firewall–also called the perimeter firewall–is configured to allow only external traffic destined for the DMZ.

Detailed explanation-2: -When you use the back-to-back firewalls option, sometimes referred to as a demilitarized zone (DMZ), two firewalls are employed to increase the level of security to the internal network. The first firewall allows users from the Internet to access resources within the perimeter network.

Detailed explanation-3: -A demilitarized zone (DMZ or DZ) is an area in which treaties or agreements between nations, military powers or contending groups forbid military installations, activities, or personnel. A DZ often lies along an established frontier or boundary between two or more military powers or alliances.

Detailed explanation-4: -A screened subnet (also known as a “triple-homed firewall") is a network architecture that uses a single firewall with three network interfaces. Interface 1 is the public interface and connects to the Internet. Interface 2 connects to a DMZ (demilitarized zone) to which hosted public services are attached.

Detailed explanation-5: -Two networks, two managers When interconnecting two networks that have different purposes or trust requirements (and when they are potentially managed by different parties) back-to-back firewalls can be used to enforce segregation and ensure managed integration and change control.

There is 1 question to complete.