network administration


Assume you are a network administrator. Your internal network has application servers that are accessed by inbound traffic from the Internet. You are considering several strategies. The strategy you select should provide significant control over user access. You must also ensure that all data passing into the internal network is properly evaluated before access is granted. Integrity of data is the top priority.

You are considering security through obscurity, defense in depth, and diversity of defense.

Answer the following question(s):

Which firewall security strategy would be the best solution for the scenario? Why?