FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which firewall implementation creates a buffer network that can be used to host email or web servers?
A
ACL
B
Perimeter firewall
C
DMZ
D
Host-based firewall
Explanation: 

Detailed explanation-1: -A network DMZ sits between two firewalls, creating a semisafe buffer zone between the internet and the enterprise LAN.

Detailed explanation-2: -In which of the following situations would you most likely implement a demilitarized zone (DMZ)? Use a demilitarized zone (DMZ) to protect public hosts on the internet, such as a web server, from attack. The DMZ uses an outer firewall that prevents internet attacks.

Detailed explanation-3: -All publicly-accessible hosts are inside the DMZ. A second firewall protects the private network from the internet.

Detailed explanation-4: -Which firewall monitors traffic from the DMZ to the LAN? When a DMZ is set up using dual firewalls, the-end firewall monitors traffic moving from the DMZ toward the LAN while the firewall monitors the traffic from the Internet toward the DMZ.

Detailed explanation-5: -What is a DMZ network? In computer security, a DMZ network (sometimes referred to as a “demilitarized zone”) functions as a subnetwork containing an organization’s exposed, outward-facing services. It acts as the exposed point to an untrusted network, commonly the internet.

There is 1 question to complete.