0
0
Cybersecurityknowledge~10 mins

DMZ architecture in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the sentence to describe the purpose of a DMZ in network security.

Cybersecurity
A DMZ is a [1] network that separates an internal network from untrusted external networks.
Drag options to blanks, or click blank then click option'
Asecure
Bprivate
Cdemilitarized
Dencrypted
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing DMZ with a fully secure or private network.
Thinking DMZ means encrypted network.
2fill in blank
medium

Complete the sentence to explain what types of servers are typically placed in a DMZ.

Cybersecurity
Servers that need to be accessible from the internet, such as [1], are placed in the DMZ.
Drag options to blanks, or click blank then click option'
Aweb servers
Bdatabase servers
Cinternal file servers
Dbackup servers
Attempts:
3 left
💡 Hint
Common Mistakes
Placing internal file servers in the DMZ.
Assuming database servers are directly exposed in the DMZ.
3fill in blank
hard

Fix the error in the description of DMZ placement.

Cybersecurity
The DMZ is located [1] the internal network and the external network.
Drag options to blanks, or click blank then click option'
Abehind
Bbetween
Coutside
Dinside
Attempts:
3 left
💡 Hint
Common Mistakes
Saying the DMZ is inside the internal network.
Saying the DMZ is outside the external network.
4fill in blank
hard

Fill both blanks to complete the sentence about firewall placement in a DMZ architecture.

Cybersecurity
A typical DMZ setup uses [1] firewalls to separate the internal network, DMZ, and external network, creating [2] layers of security.
Drag options to blanks, or click blank then click option'
Atwo
Bone
Cmultiple
Dthree
Attempts:
3 left
💡 Hint
Common Mistakes
Assuming only one firewall is used.
Confusing the number of firewalls with the number of security layers.
5fill in blank
hard

Fill all three blanks to complete the dictionary comprehension describing DMZ traffic filtering.

Cybersecurity
rules = {{'{'}}'allow_http': lambda pkt: pkt.port == [1], 'allow_ssh': lambda pkt: pkt.port == [2], 'block_all': lambda pkt: pkt.port [3] 0{{'}'}}
Drag options to blanks, or click blank then click option'
A80
B22
C!=
D==
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing up port numbers for HTTP and SSH.
Using '==' instead of '!=' for blocking other ports.