Segmenting Security Zones & Conduits in Critical Infrastructure: Best Practices & Methods


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

What does a proxy methodology NOT involve?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. What does a demilitarized zone (DMZ) usually include?

2. What is meant by a granular zoning method?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

By utilizing this resource you can test your understanding of conduits and segmenting security zones in critical infrastructure. Questions will test you on information about proximal methodology, DMZ, and one-way communication.

Quiz & Worksheet Goals

Discover how strong your knowledge of these topics is:

  • The definition of a granular zoning method
  • An example of access control implementation/ methodology
  • An exclusion in proxy methodology
  • The meaning of one-way communication
  • Items included in a demilitarized zone

Skills Practiced

You can answer the questions and practice the following topics:

  • Defining key concepts - ensure that you can accurately define the main phrase granular zoning method
  • Knowledge application - use your knowledge to answer questions about a proxy methodology exclusion
  • Interpreting information - verify that you can read information regarding included items in a demilitarized zone and interpret it correctly

Additional Learning

Segmenting Security Zones & Conduits in Critical Infrastructure: Best Practices & Methods is the companion lesson that you can study. By reading the lesson you can learn more about these topics:

  • The definition of proxy
  • Access control and how it is used
  • Steps taken to establish a connection in a proxy server