1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
4 years ago
6

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b

road security implications for years to come. Which firewall architecture is designed to host servers that offer public services?
Computers and Technology
1 answer:
PilotLPTM [1.2K]4 years ago
8 0

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

You might be interested in
A network technician is setting up a web server for a small company. The company has obtained a domain name, company-a, from a d
Alja [10]

Answer:

There is Name resolution failure

Explanation:

This normally occurs when the computer can't access the host (your server). It can be caused by several factors, such as:

-Internet connectivity is down

-The client does not have DNS servers configured or is configured with the incorrect DNS server IP addresses.

-The DNS servers are failing.

3 0
4 years ago
Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the
sergiy2304 [10]

Answer:

gravit* and collapse

Explanation:

Truncation is a keyword search technique that helps you find useful variations of a term or terms.

To find books on the topic of gravity and gravitational collapse, the best part to truncate is gravit* and collapse.

4 0
3 years ago
When you respond to an e-mail message, a good skill to develop is ___________-editing, which involves inserting your responses t
Drupady [299]

Answer: Down editing

Explanation:

Down editing is a method of replying emails which allows you to respond point by point to an email. It add certainty, precision and quality to your response and helps prevent misunderstanding of email response.

7 0
3 years ago
How long do deleted items remain in the recycle bin? forever one week until it is emptied until you log off or shut down?
GarryVolchara [31]
C. Until it is emptied is the answer to your question!
7 0
4 years ago
Read 2 more answers
3. Show the stack with all activation record instances (with all fields), when execution reaches position 1 in the following ske
Marianna [84]

Answer:

Check the explanation

Explanation:

The chain of static links is being referred to as static chain if it connects a particular activation record instances (ari) in the stack.

The chain of dynamic links is being referred to as dynamic chain if connected in the stack at a given time.

Kindly check the diagram in the attached image below.

8 0
3 years ago
Other questions:
  • A host sends a packet to a local server on the company's wired ethernet lan via an access point. how many frames are necessary f
    6·1 answer
  • This type of software can be described as end user software and is used to accomplish a variety of tasks. communications system
    15·1 answer
  • How to change font size and style and add a table when creating a webpage?
    6·1 answer
  • . What is the output of this code sequence?
    8·1 answer
  • A ________ is a term used to describe a select list that allows the user to select an option to load another web page.
    10·1 answer
  • Which is the best software application to be used by a hotel manager​
    9·1 answer
  • The term callee save denotes the case where the __________ (calling / called) program saves the contents of registers whose cont
    10·1 answer
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • In QBasic, create a number guessing challenge. Your program should generate a random number from 1-
    9·1 answer
  • A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a use
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!