{"id":908,"date":"2021-01-17T05:41:54","date_gmt":"2021-01-16T18:08:22","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0900\/"},"modified":"2021-01-17T05:44:49","modified_gmt":"2021-01-17T05:44:49","slug":"systems-security-certified-practitioner-sscp-question0900","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/SSCP\/systems-security-certified-practitioner-sscp-question0900\/","title":{"rendered":"Systems Security Certified Practitioner &#8211; SSCP &#8211; Question0900"},"content":{"rendered":"<div class=\"question\">A DMZ is located: <br \/><strong><br \/>A.<\/strong> right behind your first Internet facing firewall <br \/><strong>B.<\/strong> right in front of your first Internet facing firewall <br \/><strong>C.<\/strong> right behind your first network active firewall <br \/><strong>D.<\/strong> right behind your first network passive Internet http firewall<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><strong>Explanation:<\/strong> <\/p>\n<div class=\"explanation\">\nWhile the purpose of systems in the DMZ is to allow public access to certain internal network resources (EMAIL, DNS, Web), it is a good practice to restrict that access to the minimum necessary to provide those services through use of a firewall.<br \/>\nIn computer security, a DMZ or Demilitarized Zone (sometimes referred to as a perimeter network) is a physical or logical subnetwork that contains and exposes an organization&#8217;s external-facing services to a larger and untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization&#8217;s local area network (LAN); an external attacker only has direct access to equipment in the DMZ, rather than any other part of the network. The name is derived from the term &#8220;demilitarized zone&#8221;, an area between nation states in which military operation is not permitted.<br \/>\nThe following are incorrect answers:<br \/>\n&#8220;Right in front of your first Internet facing firewall&#8221; While the purpose of systems in the DMZ is to allow public access to certain internal network resources (EMAIL, DNS, Web), it is a good practice to restrict that access to the minimum necessary to provide those services through use of a firewall.<br \/>\n&#8220;Right behind your first network active firewall&#8221; This is an almost-right-sounding answer meant to distract the unwary.<br \/>\n&#8220;Right behind your first network passive Internet http firewall&#8221; This is an almost-right-sounding answer meant to distract the unwary.<br \/>\nReferences: CBK, p. 434 and AIO3, p. 483 and <a href=\"http:\/\/en.wikipedia.org\/wiki\/DMZ_%28computing%29\" title=\"External link\" rel=\"nofollow noopener\" target=\"_blank\">http:\/\/en.wikipedia.org\/wiki\/DMZ_%28computing%29<\/a><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A DMZ is located: A. right behind your first Internet facing firewall B. right in front of your first Internet facing firewall C. right behind your first network active firewall D. right behind your first network passive Internet http firewall Show Answer Hide Answer Correct Answer: A Explanation: While the purpose of systems in the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[1078,903,3],"class_list":["post-908","post","type-post","status-publish","format-standard","hentry","category-systems-security-certified-practitioner-sscp","tag-choices","tag-question-0900","tag-systems-security-certified-practitioner-sscp"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/comments?post=908"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/908\/revisions"}],"predecessor-version":[{"id":1984,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/posts\/908\/revisions\/1984"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/media?parent=908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/categories?post=908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/SSCP\/wp-json\/wp\/v2\/tags?post=908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}