New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 7 Question 39 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 39
Topic #: 7
[All CPEH-001 Questions]

Ron has configured his network to provide strong perimeter security. As part of his network architecture, he has included a host that is fully exposed to attack. The system is on the public side of the demilitarized zone, unprotected by a firewall or filtering router. What would you call such a host?

Show Suggested Answer Hide Answer
Suggested Answer: D

A bastion host is a gateway between an inside network and an outside network. Used as a security measure, the bastion host is designed to defend against attacks aimed at the inside network. Depending on a network's complexity and configuration, a single bastion host may stand guard by itself, or be part of a larger security system with different layers of protection.


Contribute your Thoughts:

0/2000 characters
Tiffiny
4 months ago
Wait, is it really exposed like that? Sounds sketchy!
upvoted 0 times
...
Lynna
4 months ago
Seems like a risky setup, not sure I’d trust that.
upvoted 0 times
...
Rebecka
4 months ago
No way, it's a Honeypot for sure!
upvoted 0 times
...
Val
4 months ago
I thought it was a DMZ host?
upvoted 0 times
...
Malcom
5 months ago
That's definitely a Bastion Host.
upvoted 0 times
...
Cecily
5 months ago
I recall that a bastion host is typically a strong point in a network, but if it's unprotected, could it still be considered a bastion host? I’m not confident about this one.
upvoted 0 times
...
Kris
5 months ago
I’m a bit confused because I thought a honeypot was meant to lure attackers, but this host is just exposed. Is it really a honeypot?
upvoted 0 times
...
Delfina
5 months ago
I feel like this question is similar to one we practiced where we discussed bastion hosts. I think that might be the answer, but I could be mixing it up.
upvoted 0 times
...
Paz
5 months ago
I remember studying about DMZs, and I think a host in that area is often referred to as a DMZ host, but I'm not entirely sure if that's the right term here.
upvoted 0 times
...
Lemuel
5 months ago
Okay, I think I've got this. The key is to focus on the root cause - that unapproved app. I'd start by uninstalling it and see if that resolves the data leak.
upvoted 0 times
...
Sanda
5 months ago
Okay, I've got a strategy - I'll eliminate the options that don't fit the criteria first, then choose the best remaining answer.
upvoted 0 times
...
Elin
5 months ago
I vaguely recall our discussions including all these points being interconnected. Maybe "All of the above" is the safest option?
upvoted 0 times
...

Save Cancel