What is the best practice in the firewall domain environment?
(a) Create two domain trusted and untrusted domain
(b) Create strong policy in firewall to support different types of users
(c) Create a Demilitarized zone
(d) Create two DMZ zones with one untrusted domain
The question was posed to me during an internship interview.
Question is from Security in division Security of Operating System