GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 243 Topic 25 Discussion

GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 243 Topic 25 Discussion

CEH-001 Exam Topic 25 Question 243 Discussion:
Question #: 243
Topic #: 25

Ron has configured his network to provide strong perimeter security. As part of his network architecture, he has included a host that is fully exposed to attack. The system is on the public side of the demilitarized zone, unprotected by a firewall or filtering router. What would you call such a host?


A.

Honeypot


B.

DMZ host


C.

DWZ host


D.

Bastion Host


Get Premium CEH-001 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.