COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
A security administrator is reviewing a report that shows a number of devices on internal networks attempting to connect with servers in the data center network. Which of the following security controls should the administrator add to prevent internal systems from accessing data center devices?
A
VPN
B
IPS
C
NAT
D
ACL
Explanation: 

Detailed explanation-1: -Which of the following network architecture concepts is used to securely isolate at the boundary between networks? Explanation: A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access.

Detailed explanation-2: -A firewall is a security device-computer hardware or software-that can help protect your network by filtering traffic and blocking outsiders from gaining unauthorized access to the private data on your computer.

Detailed explanation-3: -HTTPS stands for HyperText Transfer Protocol Secure that is used to protect web browser communication. It secures the connection by encrypting the traffic transmitting over HTTPS port 443, protecting customer data in transit.

There is 1 question to complete.