Question
a.
Create two domain trusted and untrusted domain
b.
Create strong policy in firewall to support different types of users
c.
Create one Demiliatarized zone
d.
Create two DMZ zones with one untrusted domain
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What is best practice in firewall domain environment ?
Similar Questions
Discover Related MCQs
Q. Which direction access cannot happen using DMZ zone by default ?
View solution
Q. What are two features of a tripwire file system ?
View solution
Q. How do viruses avoid basic pattern match of antivirus ?
View solution
Q. How does an antivirus of today identify viruses ?
View solution
Q. What is known as sandbox ?
View solution
Q. What is are two safe computing practices ?
View solution
Q. What are the different ways to intrude ?
View solution
Q. What are major components of intrusion detection system ?
View solution
Q. What are the different ways to classify an IDS ?
View solution
Q. What are characteristics of anomaly based IDS ?
View solution
Q. What is major drawback of anomaly detection IDS ?
View solution
Q. What are characteristics of signature based IDS ?
View solution
Q. What are drawbacks of signature based IDS ?
View solution
Q. What are characteristics of Host based IDS ?
View solution
Q. What are drawbacks of the host based IDS ?
View solution
Q. What are strengths of the host based IDS ?
View solution
Q. What are characteristics of stack based IDS ?
View solution
Q. What are characteristics of Network based IDS ?
View solution
Q. What are strengths of Network based IDS ?
View solution
Q. What is preferred way of encryption ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!