GIAC Information Security Fundamentals
Question No. 1
Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions, which is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed?Each correct answer represents a complete solution. Choose all that apply.
Choose all the correct options from the given list.
01 / 313