Mark works as a Network Administrator for BlueWell Inc. The company has a Windows-based
network. Mark has retained his services to perform a security assessment of the company’s network
that has various servers exposed to the Internet. So, it may be vulnerable to an attack. Mark is using
a single perimeter ?rewall, but he does not know if that is enough. He wants to review the situation
and make some reliable recommendations so that he can protect the data over company’s network.
Which of the following will Mark do to accomplish the task?
A.
Outsource the related services.
B.
Encrypt the data and than start transmission.
C.
Locate the Internet-exposed servers and devices in an internal network.
D.
Create a perimeter network to isolate the servers from the internal network.
Explanation:
In the above scenario, Mark will create a perimeter network to isolate the servers from the internal
network because Internet-exposed servers and devices should not be located in an internal network.
They have to be segmented or isolated into a protected part of the network.