What devices should not be part of a network’s perimeter - ProProfs Discuss
Advertisement

What devices should not be part of a network’s perimeter defense?

Asked by Cindymurray, Last updated: Mar 28, 2024

+ Answer
Request
Question menu
Vote up Vote down

2 Answers

steven gatera

steven gatera

steven gatera
Steven gatera

Answered Jun 06, 2018

None of the above

The defensive perimeter extends out from these fi rst protective devices, to include proactive defense such as boundary routers which can provide early warning of upstreamattacks and threat activitie

upvote downvote
Reply 

John Smith

John Smith

John Smith
John Smith

Answered Feb 06, 2017

None of the above

Th e security perimeter is the fi rst line of protection between trusted and untrusted networks. In general, it includes a fi rewall and router that helps fi lter traffi c. Security perimeters may also include proxies and devices, such as an intrusion detection system (IDS), to warn of suspicious traffi c. Th e defensive perimeter extends out from these fi rst protective devices, to include proactive defense such as boundary routers which can provide early warning of upstream attacks and threat activities. Page 765.
upvote downvote
Reply 

Advertisement
Advertisement
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader

Email Sent
We have sent an email to your address "" with instructions to reset your password.