COMPUTER NETWORKING

NETWORK SECURITY

FIREWALLS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
You have used firewalls to create a demilitarized zone. You have a web server that needs to be accessible to internet users. The web server must communicate with a database server for retrieving product, customer, and order information.How should you place devices on the network to best protect the servers? (Select two.)
A
Put the database server on the private network.
B
Put the database server inside the DMZ.
C
Put the web server on the private network
D
Put the web server inside the DMZ.
Explanation: 

Detailed explanation-1: -A DMZ network provides a buffer between the internet and an organization’s private network. The DMZ is isolated by a security gateway, such as a firewall, that filters traffic between the DMZ and a LAN.

Detailed explanation-2: -Where should an organization’s web server be placed? A web server should be placed in the demilitarized zone (DMZ). The DMZ is a network that contains publicly accessible resources. The DMZ is located between the private network and an untrusted network (such as the internet) and is protected by a firewall.

Detailed explanation-3: -In which of the following situations would you most likely implement a demilitarized zone (DMZ)? EXPLANATION Use a demilitarized zone (DMZ) to protect public hosts on the internet, such as a web server, from attack. The DMZ uses an outer firewall that prevents internet attacks.

Detailed explanation-4: -DMZs function as a buffer zone between the public internet and the private network. The DMZ subnet is deployed between two firewalls. All inbound network packets are then screened using a firewall or other security appliance before they arrive at the servers hosted in the DMZ.

There is 1 question to complete.