A bastion host is a hardened system that is specifically designed to be exposed to the public internet while minimizing security risks. It is configured to perform only essential functions, reducing its attack surface. Bastion hosts are commonly used for secure remote access (e.g., SSH jump servers) or as intermediary systems for accessing internal networks securely.
Why Not the Others?
A. Firewall → Firewalls control traffic flow and enforce security policies but do not function as publicly exposed operational systems.
B. Proxy → Proxies act as intermediaries for network requests but are not standalone hardened systems for direct exposure.
C. Honeypot → A honeypot is a decoy system used to attract and analyze attacks, not a secure public-facing system for legitimate operations.
D. Bastion
A bastion host is a secure system that is exposed to the public Internet and designed to withstand attacks. It is configured to perform only the desired operations and is hardened to resist compromise. Bastion hosts are typically used as gateways or intermediaries to provide access to internal network resources while minimizing the security risks associated with direct exposure to the Internet.
This section is not available anymore. Please use the main Exam Page.CCSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MaciekMT
1 month, 3 weeks agoSivath
4 months, 3 weeks agoAJ2021
2 years, 5 months agoDERCHEF2009
2 years, 5 months agoakg001
2 years, 11 months ago