Which of the following is true regarding implementation of DMZ?
A.
The DMZ isolates all servers that are accessible from untrusted sources, such as the Internet
B.
If you have servers that are externally accessible from the Internet, it is recommended to create a DMZ
C.
Servers in the DMZ should be as secure as possible
D.
Servers in the DMZ are accessible from any network, and all externally accessible servers should be located in the DMZ
E.
Do allow the DMZ to initiate connections into the internal network