Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions, which is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed? Each correct answer represents a complete solution. Choose all that apply. A. Attacker can exploit any protocol used to go into the internal network or intranet of the com pany. B. Attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different. C. Attacker can gain access to the Web server in a DMZ and exploit the database. D. Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network. Â Suggested Answer: ACD This question is in GISF exam For getting GIAC Information Security Fundamentals (GISF) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by GIAC. Trademarks, certification & product names are used for reference only and belong to GIAC.
Please login or Register to submit your answer