I’m working on a Computer Science question and need guidance to help me study.
Describe and interpret the deployment considerations involved with using network security monitoring products to obtain full content data. Considerations include:
Perimeter: Internet – Boundary Router, External Switch to the Firewall
Wireless Zone: Wireless Network, Wireless Access Point Firewall
Demilitarized Zone: DMZ Network – DMZ Switch, Firewall
Intranet: Internal Network- Internal Switch, Firewall