1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
10

how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks

B.by monitoring traffic on a private network to protect it from malicious traffic. C. by interacting directly with external networks to protect. D. by interacting with a private network to ensure proper functioning of a firewall E.by monitoring traffic on external networks to prevent malicious traffic from reaching a private network
Computers and Technology
1 answer:
Alla [95]3 years ago
3 0

Answer:

C. by interacting directly with external networks to protect a private network.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In order to prevent a cyber attack on a private network, users make use of demilitarized zone (DMZ) depending on the situation.

A demilitarized zone (DMZ) work by interacting directly with external networks to protect a private network.

You might be interested in
Is a location on your computer screen where you type text entries to communicate with the computer’s operating system?
goldfiish [28.3K]
Command line. hope this helps
4 0
3 years ago
You can declare two variables with the same name in ________. a block a method one as a formal parameter and the other as a loca
prisoha [69]
Different methods in a class.
5 0
4 years ago
A farmer is reading a nature guide to learn how to make changes to a pond so that it will attract and support wildlife. The guid
Leya [2.2K]
D is the answer


Hope this helps
4 0
3 years ago
The template code provided is intended to check whether an integer entered by the user is outside of the range 20-29 (inclusive)
Pavlova-9 [17]

import java.util.Scanner;

public class JavaApplication60 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter a number in the twenties");

       int num = scan.nextInt();

   if(num >= 30 || num <= 19){

       System.out.println("That's not in the twenties!");

       num = 25;

   }

   System.out.println("Your number is " + num);

   }

}

This is the complete code including the main class and main method. I hope this helps!

3 0
3 years ago
If you need to use arrows in a chart, which feature or menu option of a word processing program would you use?
Jlenok [28]
B or e honestly either one
7 0
3 years ago
Read 2 more answers
Other questions:
  • The Sarbanes-Oxley Act restricts electronic and paper data containing personally identifiable financial information.A. True
    8·1 answer
  • Which delivery model is an example of a cloud computing environment that provides users with a web based email service ?
    9·2 answers
  • Which of the following would be MOST useful to determine why packets from a computer outside the network are being dropped on th
    5·1 answer
  • In Load/Store Architecture, memory is only referenced by load and store instructions.
    15·1 answer
  • I want to take several courses of MIT OCW, and I'm searching for study groups. Is this website the place to find them?
    5·1 answer
  • Describe the dynamic Network Address Translation (NAT).
    9·1 answer
  • ) A stub network has ______. (Points : 2) one backup route
    10·1 answer
  • Which of the following statements is true of subroutines? Check all that apply.
    15·2 answers
  • Guidewords for the word “serpent” may be
    8·2 answers
  • During the ___ phase of a software development project, members broadly define the features that the software should include
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!