1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
skelet666 [1.2K]
3 years ago
6

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b

road security implications for years to come. Which firewall architecture is designed to host servers that offer public services?
Computers and Technology
1 answer:
PilotLPTM [1.2K]3 years ago
8 0

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

You might be interested in
Which type of chart is preferable when you are dealing with a timeframe?
ANTONII [103]

Answer:

Pie chart

Explanation:

Just get to know

7 0
2 years ago
How are sorting tools helpful for using spreadsheets and databases? Sorting tools let you locate information by searching for na
Black_prince [1.1K]

Answer:

Sorting tools allow you to organize data into columns and rows that help you locate what you are looking for.

Explanation:

Spreadsheet applications and relational databases are similar in configuration as they are both arranged in rows and columns (tabular). Sorting a spreadsheet or database is useful as it helps to organize data. A sorted spreadsheet or database can be in ascending or descending order which makes it easier and faster to locate rows of data manually or by query.

7 0
2 years ago
Read 2 more answers
What are the steps to configure user information in a document?
chubhunter [2.5K]

Answer:

file, properties, options, general

Explanation:

4 0
2 years ago
Read 2 more answers
25 pts! If programmers cannot write an algorithm because the problem is too complex, which methodology can they use to reach an
Setler [38]

Answer:

D, most likely thats what I was taught .

3 0
3 years ago
How did the public feel towards Martin Luther King, Jr.?
Phoenix [80]

Answer:

Most Americans admire the life and work of Martin Luther King Jr., but their perception of him is smoke and mirrors.

Explanation:

hope this is what youre lookin for

6 0
2 years ago
Other questions:
  • Plz tell me a storage device that should be used for this and why
    11·1 answer
  • Which Access database object asks a question about the data stored in a database and displays specific fields and records that a
    15·1 answer
  • You create a new document and save it to a hard drive on a file server on your company's network. then you employ an encryption
    9·1 answer
  • Where in an email would u find information about the action requirements​
    9·1 answer
  • Pseudocode is a good choice to communicate a____of a process
    10·1 answer
  • A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa
    7·1 answer
  • 1. Write programming code in C++ for school-based grading system. The program should accept the Subject and the number of studen
    8·1 answer
  • Draw a flowchart or write pseudocode to represent a program's logic that allows the user to enter a value. The program multiplie
    5·1 answer
  • What time is it NOW??
    11·2 answers
  • Is a device used to test the network connection.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!