Which of the following security threats may occur if DMZ protocol attacks are performed?

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized
Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.
Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized
Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.
Which of the following security threats may occur if DMZ protocol attacks are performed?

Each correct answer represents a complete solution. Choose all that apply.

A.
The attacker can exploit any protocol used to go into the internal network or intranet of
thecompany.

B.
The attacker can gain access to the Web server in a DMZ and exploit the database.

C.
The attacker can perform a Zero Day attack by delivering a malicious payload that is not a part
of the intrusion detection/prevention systems guarding the network.

D.
The attacker managing to break the first firewall defense can access the internal network
without breaking the second firewall if it is different.

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *