COMPUTER THREATS SECURITY
WHAT IS A FIREWALL IN NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
ACL
|
|
Perimeter firewall
|
|
DMZ
|
|
Host-based firewall
|
Detailed explanation-1: -A network DMZ sits between two firewalls, creating a semisafe buffer zone between the internet and the enterprise LAN.
Detailed explanation-2: -In which of the following situations would you most likely implement a demilitarized zone (DMZ)? Use a demilitarized zone (DMZ) to protect public hosts on the internet, such as a web server, from attack. The DMZ uses an outer firewall that prevents internet attacks.
Detailed explanation-3: -All publicly-accessible hosts are inside the DMZ. A second firewall protects the private network from the internet.
Detailed explanation-4: -Which firewall monitors traffic from the DMZ to the LAN? When a DMZ is set up using dual firewalls, the-end firewall monitors traffic moving from the DMZ toward the LAN while the firewall monitors the traffic from the Internet toward the DMZ.
Detailed explanation-5: -What is a DMZ network? In computer security, a DMZ network (sometimes referred to as a “demilitarized zone”) functions as a subnetwork containing an organization’s exposed, outward-facing services. It acts as the exposed point to an untrusted network, commonly the internet.