DMZ Protocol Attacks

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Q: Drew is a network administrator. He has implemented a dual firewall Demilitarized Zone (DMZ) to isolate the rest of his company’s network from other portions that are accessible to the public via the Internet. Which of the below security threats would be possible if an attacker launched successful DMZ protocol attacks?

Each correct answer represents a complete solution. Choose three.

a. The attacker (if he bypassed the first firewall defense) will have access to the company’s internal network without breaking a second unique firewall.

b. The attacker would gain entrance onto the web server in the DMZ and could exploit the database.

c. The attacker would be able to exploit protocols to access the company’s internal network or intranet.

d. The attacker would be able to launch a Zero Day attack, which would entail transmitting a malicious payload outside of the IDS/prevention systems protecting the network.

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?