COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The Chief Information Security Officer (CISO) has mandated that all IT systems with credit card data be segregated from the main corporate network to prevent unauthorized access and that access to the IT systems should be logged. Which of the following would BEST meet the CISO’s requirements?
A
Sniffers
B
NIDS
C
Firewalls
D
Layer 2 Switches
Explanation: 

Detailed explanation-1: -Which of the following network architecture concepts is used to securely isolate at the boundary between networks? Explanation: A demilitarized zone (DMZ) is an area of a network that is designed specifically for public users to access.

Detailed explanation-2: -Firewalls can protect against employees copying confidential data from within the network. Software firewalls are usually more scalable than hardware firewalls. Stateless packet filtering keeps a record of connections that a host computer has made with other computers.

Detailed explanation-3: -Restrictive policy-Calls for a firewall and associated network security components to deny all traffic by default.

Detailed explanation-4: -For those who understand the OSI (Open System Interconnection) model of networking, the technical difference between a proxy and a NAT is that the proxy server works on the transport layer (layer 4) or higher of the OSI model, whereas a NAT works on the network layer (layer 3).

There is 1 question to complete.