According to scenario 7, a demilitarized zone (DMZ) is deployed within InfoSec’s network. What type of control has InfoSec implemented in this case?
According to scenario 7, a demilitarized zone (DMZ) is deployed within InfoSec’s network. What type of control has InfoSec implemented in this case?
C is the correct answer . This is a Preventative control as creats a protective gap between the critical IT estate and what needs to be accessed by the public.