Question

You want to use a packet firewall to protect the Hospital network but you are hesitant...

You want to use a packet firewall to protect the Hospital network but you are hesitant to choose the right location among the following: putting it on the web server at DMZ, putting it along with the IDS server, putting it on the screened subnet with DMZ, or putting it on the domain boundary. Recommend the right answer with justification as to why or why not.

Homework Answers

Answer #1

Option-c

Putting the packet firewall on the screened subnet with DMZ(Demilitarized Zone)

Screened subnet firewall(triple homed firewall) is more secured and to break this the intruder have to bypass through two screening routers.

DMZ has hosts which aren't protected by Screening router so, A screened subnet is used as it is located behind the screening router and if we put firewall at this point then the there is no possibility of untrusted hosts entering into the network.The two screening routers are called access router(external router) and choke router(internal router)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
You want to use a packet firewall to protect the Hospital network but you are hesitant...
You want to use a packet firewall to protect the Hospital network but you are hesitant to choose the right location among the following: putting it on the web server at DMZ, putting it along with the IDS server, putting it on the screened subnet with DMZ, or putting it on the domain boundary. Recommend the right answer with justification as to why or why not.
In order to protect classified encrypted data from disclosure and transmission outside of the Hospital network,...
In order to protect classified encrypted data from disclosure and transmission outside of the Hospital network, you need to choose among the following: proper configuration of DMZ, use of strong encryption algorithms, safeguards over keys. State your selection and justify your choice
Overview Your assignment is to complete a wireless network design for a small company. You will...
Overview Your assignment is to complete a wireless network design for a small company. You will place a number of network elements on the diagram and label them appropriately. A network diagram is important to communicate the design features of a network between network administrators, system administrators and cyber-security analysts. It helps to create a shared mental model between these different technologists, yet each will have their own perspective on what is important to have documented on the diagram. Please...
What happens when you use Amazon Virtual Private Cloud (Amazon VPC) to create a new VPC?...
What happens when you use Amazon Virtual Private Cloud (Amazon VPC) to create a new VPC? Three subnets are created by default: one for each Availability Zone. An internet gateway is created by default. Three subnets are created by default in one Availability Zone. A main route table is created by default. Question 2 Which component of AWS Global Infrastructure does Amazon CloudFront use to ensure low-latency delivery? AWS edge locations Amazon Virtual Private Cloud (Amazon VPC) AWS Regions AWS...