Question: When a computing network uses highly restrictive firewalls and other tools to create a security barrier around the computing systems that host internal or inside
When a computing network uses highly restrictive firewalls and other tools to create a security barrier around the computing systems that host internal or "inside" systems, and less restrictive firewalls to provide limited exposure to "outside" systems, that is called a: Group of answer choices demilitarized zone DMZ an intranet. a twotier configuration. a secure perimeter.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
