Posted by: Pdfprep
Post Date: February 1, 2021
Ron has configured his network to provide strong perimeter security. As part of his network architecture, he has included a host that is fully exposed to attack. The system is on the public side of the demilitarized zone, unprotected by a firewall or filtering router.
What would you call such a host?
A . Honeypot
B . DMZ host
C . DWZ host
D . Bastion Host
Answer: A
Leave a Reply