Infosec Know IT All Trivia: Demilitarized zones

Find out how much you know about DMZs with this Trivia Tip.

Test your knowledge of demilitarized zones with these trivia questions. Scroll down to the bottom of the page for the correct answers. If you get them all correct, you can call yourself an Infosec Know IT All!

1. Which statement below is false?
a. A DMZ is located behind the first Internet firewall.
b. Any system on a DMZ can be compromised because it's accessible from the Internet.
c. A DMZ is an isolated network segment.
d. In order to have a DMZ, you must also have packet-filtering capabilities.
e. None of the above.

2. What is the main purpose of a DMZ?
a. To provide a place for systems on your network that need less protection than the rest of your systems.
b. To provide stronger protection to more valuable systems.
c. To attract and trap crackers who attempt to penetrate your systems.
d. To control what outside resources users have access to.

3. True or False: My company uses e-mail, but we don't have a Web site, so there's no need to have a DMZ.
a. True
b. False

4. A DMZ effectively acts as an intermediary between a workstation user and the Internet. This can also be done by a ...
a. router
b. bridge
c. switch
d. proxy server

5. True or False: The DMZ host is not able to initiate a session back into a private network.
a. True
b. False

What do you think of our daily trivia questions? Are they too easy? Too hard? Let me know.


1. e. None of the above.
For more information on demilitarized zones, visit our  Best Web Links.

2. a. Provide a place for systems on your network that need less protection than the rest of your systems.
For more information on the purpose of a DMZ, read this WhatIs definition.

3. b. False
Laura Didio discusses DMZs in this Web Security Tip.

4. d. proxy server
For more information on network security, visit our Best Web Links.

5.  a. True For more information on the role of a DMZ, read this Ask the Expert Q&A.

This was last published in December 2003

Dig Deeper on Enterprise network security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.