Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 477 discussion

Actual exam question from ISC's CISSP
Question #: 477
Topic #: 1
[All CISSP Questions]

An organization would like to secure a trusted and untrusted network. One of the requirements is to provide access to the trusted network from a few of the hosts from the untrusted network. Which of the following is the BEST device or system that should be deployed to enable this capability?

  • A. Router
  • B. Bastion host
  • C. Forward proxy host
  • D. Intrusion detection system (IDS)
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
yottabyte
Highly Voted 1 year, 9 months ago
Selected Answer: B
Bastion host can be used to provide access to hosts from untrusted network to trusted network. A bastion host is a server whose purpose is to provide access to a private network from an external network, such as the Internet. Because of its exposure to potential attack, a bastion host must minimize the chances of penetration.
upvoted 10 times
jackdryan
1 year, 6 months ago
B is correct
upvoted 1 times
...
...
Soleandheel
Most Recent 11 months, 1 week ago
B. Bastion host A bastion host, also known as a jump host or a jump server, is a dedicated system that acts as an intermediary between the untrusted network and the trusted network. It's a highly secure and controlled point of entry that allows authorized users to access the trusted network from the untrusted network. The bastion host is typically hardened, monitored, and tightly controlled to minimize security risks while providing access to specific hosts or services in the trusted network.
upvoted 1 times
...
gpt_test
1 year ago
Selected Answer: B
Correct Answer: B. Bastion host Explanation: A Bastion host serves as a strongly secured gateway between an inside network (trusted) and an outside network (untrusted). It is hardened to resist attacks and is specially configured to allow only specific types of access from specific hosts. Given that the requirement is to provide access to the trusted network from a few of the hosts from the untrusted network, a Bastion host is the most suitable option. It can be configured to allow only those specific hosts to access the trusted network while maintaining a high level of security.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...