2023 IT Examiner School

Internal Use Only

Network Topology: Security Zones The topology can be broken down into three risk zones: • Trusted (Intranet) • Semi-trusted (Demilitarized Zone or DMZ, Third Party, Cloud) • Untrusted (Internet)

Internal Use Only

Network Topology: Trusted

Made with FlippingBook - Share PDF online