You are assigned with configuring a sensitive data network where here is no scop
ID: 3773153 • Letter: Y
Question
You are assigned with configuring a sensitive data network where here is no scope of tolerating viruses and worms. You should keep the emails with attachments in:
The gateway router just before the DMZ
The Intranet
The proxy server
Between 2 DMZs of same security sensitiveness
A DMZ
Which topology is best suited for factories assembling cars:
None of the other choices
A combination of Ring, Bus, and Star
Ring
Star
Bus
The gateway router just before the DMZ
The Intranet
The proxy server
Between 2 DMZs of same security sensitiveness
A DMZ
Explanation / Answer
1- The gateway router just before the DMZ
Between 2 DMZs of same security sensitiveness
Clarification -> DMZ is not seen as belonging to either party bordering it. This concept applies to the computing use of the metaphor in that a DMZ which is, for example, acting as a gateway to the public Internet, is neither as secure as the internal network, nor as insecure as the public internet.
In this case, the hosts most vulnerable to attack are those that provide services to users outside of the local area network, such as e-mail, Web and Domain Name System (DNS) servers. Because of the increased potential of these hosts suffering an attack, they are placed into this specific subnetwork in order to protect the rest of the network if an intruder were to compromise any of them successfully.
Hosts in the DMZ are permitted to have only limited connectivity to specific hosts in the internal network, as the content of DMZ is not as secure as the internal network. Similarly communication between hosts in the DMZ and to the external network is also restricted, to make the DMZ more secure than the Internet, and suitable for housing these special purpose services. This allows hosts in the DMZ to communicate with both the internal and external network, while an intervening firewall controls the traffic between the DMZ servers and the internal network clients, and another firewall would perform some level of control to protect the DMZ from the external network.
A DMZ configuration provides security from external attacks, but it typically has no bearing on internal attacks such as sniffing communication via a packet analyzer or spoofing such as e-mail spoofing.
2)
Which topology is best suited for factories assembling cars:None of the other choices
Ring Topology
Clarification ->
As each car enters the assembly line, the car's VIN (Vehicle Identifi cation Number) is read from an RFID tag. The Master PLC exchanges data with the data server, and in reply gets all of the information it needs about the car through the Ethernet LAN. The data for the car is then delivered to line equipment for operation references, such as torque and pick up systems, through the Fieldbus network. During the operation, the devices at the station send event messages back to the master PLC, which forwards the message to the data server for storage and further analysis.
The assembly shop uses a dual-redundant concept for the network of assembly lines that are part of mission-critical applications. The main communication network connecting the assembly stations and paint stations uses a redundant ring topology.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.