Systems Security Certified Practitioner – SSCP – Question0890

A proxy can control which services (FTP and so on) are used by a workstation , and also aids in protecting the network from outsiders who may be trying to get information about the:

A.
network's design
B. user base
C. operating system design
D. net BIOS' design

Correct Answer: A

Explanation:

To the untrusted host, all traffic seems to originate from the proxy server and addresses on the trusted network are not revealed.
“User base” is incorrect. The proxy hides the origin of the request from the untrusted host.
“Operating system design” is incorrect. The proxy hides the origin of the request from the untrusted host.
“Net BIOS’ design” is incorrect. The proxy hides the origin of the request from the untrusted host.
References: CBK, p. 467 AIO3, pp. 486 -490