1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fiasKO [112]
3 years ago
15

A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder

cannot access the intranet. Which
of the following security techniques should be used?
A. Place them behind honeypots
B. Place them in a separate subnet
C. Place them between two internal firewalls
D. Place them in the demilitarized zone
Computers and Technology
1 answer:
Taya2010 [7]3 years ago
4 0

Answer:

D. Place them in the demilitarized zone.

Explanation:

Demilitarized zone(DMZ) is a logical or physical sub network that contains and gives exposure to an organization's external-facing services to an not trust worthy network, basically a larger network like Internet. It's purpose is to add an extra layer of security in an organization's LAN(local area network).So we conclude that DMZ is best way so that intruder cannot access the intranet.

You might be interested in
You are going to create an Arduino sketch where you have two push buttons, one piezo, one
Elanso [62]

Answer:

asw

Explanation:

4 0
3 years ago
Which technology is used to uniquely identify a wlan network?
expeople1 [14]
The answer is SSID

SSID which in full stands for Service Set Identifier is used to identify a network. It ensures that clients are able to locate a WLAN in which they are attached to. In Layman’s terms, it’s the username or the primary name in a WiFi setup in which a user joins and is connected to.






8 0
3 years ago
Which protocol that runs on cisco routers shares information between cisco devices?
just olya [345]
The CDP protocol runs on CISCO routers and shares information between CISCO devices. CDP stands for Cisco Discovery Protocol. It is a protocol on Layer 2 (Data -Link layer) of the OSI model that enables CISCO devices to share information between them. The information includes for example the <span>operating system version and IP address.</span>
6 0
3 years ago
Why when I put a question in the search bar it says something went wrong?
xz_007 [3.2K]
It’s says the same thing to me too!
8 0
3 years ago
In 2016, what was the most popular goggle search?
sineoko [7]
Trump. Getty/ Sara D. ...
David Bowie. Jo Hale/ Getty Images. ...
Olympics. David Ramos/Getty Images. ...
Slither.io. Slither.io. ...
Pokémon Go. Reuters. ...
Hurricane Matthew. Joe Raedle/Getty Images. ...
Prince. Jonathan Daniel/Getty Images. ...
Powerball. Justin Sullivan/Getty Images. It was a year of massive, million-dollar Powerball drawings.
5 0
3 years ago
Other questions:
  • What does Tristan need to do to add a row at the
    14·1 answer
  • A computer professional who has access to sensitive information shares this information with a third party. Which professional c
    9·2 answers
  • A machine that is used to print newspaper is a
    12·2 answers
  • Define data, explain its three forms, and the general steps a computer performs related to data.
    7·1 answer
  • A collection of computers and other hardware devices that are connected together to share hardware, software, and data, as well
    15·1 answer
  • How do you change the number of rows and columns displayed for an embedded Excel object on a PowerPoint slide?
    8·1 answer
  • As a prospective student, what is the best reason to request an interview with your college application?
    6·1 answer
  • What do I do if my friend wants me to watch a video at my house?
    8·2 answers
  • What is a non-example for job application???
    11·1 answer
  • When you start a new, blank document, you usually end up changing the font to arial 11. 5 point. How can you make these settings
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!