COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which firewall implementation creates a buffer network that can be used to host email or web servers?
A
ACL
B
Perimeter firewall
C
DMZ
D
Host-based firewall
Explanation: 

Detailed explanation-1: -A network DMZ sits between two firewalls, creating a semisafe buffer zone between the internet and the enterprise LAN.

Detailed explanation-2: -A DMZ network provides a buffer between the internet and an organization’s private network. The DMZ is isolated by a security gateway, such as a firewall, that filters traffic between the DMZ and a LAN.

Detailed explanation-3: -The DMZ network exists to protect the hosts most vulnerable to attack. These hosts usually involve services that extend to users outside of the local area network, the most common examples being email, web servers, and DNS servers.

Detailed explanation-4: -In computer security, a DMZ or demilitarized zone (sometimes referred to as a perimeter network or screened subnet) is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to an untrusted, usually larger, network such as the Internet.

There is 1 question to complete.