Which of the following security techniques should be used?

A network technician needs to set up two public facing web servers and wants to ensure that if they are compromised the intruder cannot access the intranet.
Which of the following security techniques should be used?

A network technician needs to set up two public facing web servers and wants to ensure that if they are compromised the intruder cannot access the intranet.
Which of the following security techniques should be used?

A.
Place them behind honeypots

B.
Place them in a separate subnet

C.
Place them between two internal firewalls

D.
Place them in the demilitarized zone



Leave a Reply 0

Your email address will not be published. Required fields are marked *