Which of the following statements are true about perimeter security?
A.
Though it is often associated with network security, it also applies to physical security measures
as fences and locked doors.
B.
It is most effective when there is only one perimeter. For example, when inner perimetersare
established, they reduce the effectiveness of outer perimeters.
C.
The Demilitarized Zone (DMZ) is the most protected zone of the network, which should be
reserved for only the most sensitive data.
D.
Connections should not be permitted to span more than one perimeter or firewall.
E.
Perimeter security can be a component of a defense-in-depth strategy.
F.
Perimeter security is most effective for protection against insider threats.
Explanation:
A: Your inner perimeter consists of the doors, windows and walls of your building(s).
Protecting your inner perimeter is usually accomplished with locks, keys and alarm systems.
D:E: Defense in depth is a security strategy in which multiple, independent, and mutually
reinforcing security controls are leveraged to secure an IT environment. Defense in depth should
be applied so that a combination of firewalls, intrusion
detection and prevention, user management, authentication, authorization, and
encryption mechanisms are employed across tiers and network zones.
Defense in depth is compatible with perimeter security
in that network perimeters (or more generically, protection zones) can make up part of
the defense in depth strategy.
Reference: Oracle Reference Architecture,Security, Release 3.1