COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In which of the following situations would you most likely implement a demilitarized zone (DMZ)?
A
You want internet users to see a single IP address when accessing your company network.
B
You want to protect a public web server from attack.
C
You want to detect and respond to attacks in real time.
D
You want to encrypt data sent between two hosts using the internet.
Explanation: 

Detailed explanation-1: -Option C is the correct answer. DMZ perform as the shield for the network between suspicious internet and secured LAN internet. It is usually located between two firewalls. It protects the public host networks over the internet like web servers from malware attacks.

Detailed explanation-2: -In which of the following situations would you most likely implement a demilitarized zone (DMZ)? EXPLANATION Use a demilitarized zone (DMZ) to protect public hosts on the internet, such as a web server, from attack. The DMZ uses an outer firewall that prevents internet attacks.

Detailed explanation-3: -The goal of a DMZ is to add an extra layer of security to an organization’s local area network. A protected and monitored network node that faces outside the internal network can access what is exposed in the DMZ, while the rest of the organization’s network is safe behind a firewall.

Detailed explanation-4: -The ultimate goal of a DMZ is to allow access to resources from untrusted networks while keeping the private network secured. Resources commonly placed in the DMZ include, Web servers, Mail servers, FTP servers, and VoIP servers.

Detailed explanation-5: -DMZ networks are deployed to protect sensitive systems and resources. DMZ networks are often used for: Isolating and separating potential target systems from internal networks. Reducing and controlling access to the systems by external users.

There is 1 question to complete.