Which of the following should be of concern to an IS auditor reviewing an organization's network to ensure attack vectors from the Internet are minimized?
A.
The organization employs different types of firewalls in the demilitarized zone (DMZ).
B.
The organization's email server is in the demilitarized zone (DMZ).
C.
A data loss prevention (DLP) system is behind the organization's firewalls.
D.
A router is Internet-facing at the network perimeter.
An IS auditor reviewing an organization's network to ensure attack vectors from the Internet are minimized should be concerned about **option D**. A router that is Internet-facing at the network perimeter can be a potential entry point for attackers to gain unauthorized access to the organization's network
Placing an email server in the DMZ could expose it to potential external attacks, as email servers often handle communication with external entities. A compromised email server could serve as a potential entry point for attackers.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
3008
1 month agoFAGFUR
1 month, 4 weeks ago