1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
3 years ago
6

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b

road security implications for years to come. Which firewall architecture is designed to host servers that offer public services?
Computers and Technology
1 answer:
PilotLPTM [1.2K]3 years ago
8 0

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

You might be interested in
Which of the following are the lines defining the borders of a shape? (1 point)
shtirl [24]

Answer:

no I is edges

2 is gaming

3 is creativity

3 0
3 years ago
Information Security
ziro4ka [17]

Answer:

THEUNITEDSTATESWASATPEACEWITHTHATNATIONANDATTHESOLIC ITATIONOFJAPANWASSTILLINCONVERsATIONWITHITSGOVERNMEN TANDITSEMPERORLOOKINGTOWARDTHEMAINTENANCEOFPEACEINTH EPACIFICINDEEDONEHOURAFTERJAPANESEAIRSQUADRONSHADCOM MENCEDBOMBINGINOAHUTHEJAPANESEAMBASSADORTOTHEUNITEDS TATESANDHISCOLLEAGUEDELIVEREDTOTHESECRETARYOFSTATEAF ORMALREPLYTOARECENTAMERICANMESSAGEWHILETHIsREPLYSTAT EDTHATITSEEMEDUSELESSTOCONTINUETHEEXIsTINGDIPLOMATIC NEGOTIATIONsITCONTAINEDNOTHREATORHINTOFWARORARMEDATTACK

Explanation:

Use this mapping:

abcdefghijklmnopqrstuvwxyz

kfazsrobcwdinuelthqgxvpjmy

6 0
3 years ago
In 3–5 sentences, describe how technology helps business professionals to be more efficient.
quester [9]

Answer:

Technology helps business professionals, keep more organized, communicate better, and effectively keeps businesses secure. Technology helps keep employee information and business paper work more organized using computers and software; while making it easier to communicate with employee's using e-mail and memo's.

Explanation:

8 0
3 years ago
Read 2 more answers
Where are some places that cyberbullying occurs? check all that apply
antiseptic1488 [7]

Answer:

social media like  snap chat twitter  and face book .it can even happen over email.or in school chats.

Explanation:

5 0
3 years ago
Read 2 more answers
Gaven's instructor told him to include a personal statement in his work portfolio. Why did his instructor recommend including a
algol [13]
The recommendation of the instructor for Gaven to include a personal statement in his work portfolio will allow him to identify his career goals. If he is unable to show this to his work portfolio then he may simply state it in the personal statement. Thus, the answer to this item is letter A. 
3 0
3 years ago
Other questions:
  • Use the distributive property to expand the following expression. (9m - 6)7
    13·2 answers
  • How to write greater than or equal to in excel if function
    7·1 answer
  • What does aperture control? A)amount of light the image sensor captures when taking a photo. B)how sensitive the camera is to in
    10·2 answers
  • The most commnonly used OS is ___.<br> MS-DOS<br> Windows<br> Mac<br> Linux
    8·1 answer
  • What happens to a message when it is deleted?
    11·1 answer
  • Can a idler gear increase or decrease torque?
    7·1 answer
  • Which phrase best describes a scenario in Excel 2016?
    5·2 answers
  • How many questions do you have to answer before you can use direct messages on Brainly?
    13·2 answers
  • How to check the at&amp;t internet speed on my computer
    9·1 answer
  • A ____ is an Access feature that makes it easy to enter data.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!