Which term describes a computer system designed and configured to protect network resources from attacks?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which term describes a computer system designed and configured to protect network resources from attacks?

Explanation:
A Bastion Host is a system that has been deliberately hardened and is exposed to an untrusted network to withstand attacks while providing tightly controlled access to protected resources. This setup is designed specifically for defense at the boundary, acting as a single, robust point through which external access is allowed and monitored. The idea is to minimize services, apply strong access controls, and keep thorough logging so that any attack surface is reduced and any intrusions can be detected quickly. This fits the description in the question because the emphasis is on a computer system that is purpose-built to protect network resources from attacks, rather than on a broader network segment or a generic traffic-filtering device. A firewall, in contrast, is primarily about filtering traffic between networks. A DMZ is a network zone, not a single system. A screened subnet describes an architectural pattern involving firewalls around a DMZ.

A Bastion Host is a system that has been deliberately hardened and is exposed to an untrusted network to withstand attacks while providing tightly controlled access to protected resources. This setup is designed specifically for defense at the boundary, acting as a single, robust point through which external access is allowed and monitored. The idea is to minimize services, apply strong access controls, and keep thorough logging so that any attack surface is reduced and any intrusions can be detected quickly.

This fits the description in the question because the emphasis is on a computer system that is purpose-built to protect network resources from attacks, rather than on a broader network segment or a generic traffic-filtering device. A firewall, in contrast, is primarily about filtering traffic between networks. A DMZ is a network zone, not a single system. A screened subnet describes an architectural pattern involving firewalls around a DMZ.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy