This is a dedicated watch page for a single video.
As the information security manager of HDA Inc., you've implemented a network segmentation approach. You've divided the network into two parts with details as follow: ? The first subnet is local which does not have direct Internet access. All sensitive resources are stored in this segment. ? The second subnet is external and has Internet access, where you've placed public web servers that provide services to clients. ? Communication between the two subnets is enabled through a gateway that is protected by a firewall. From an information security perspective, second segment is primarily referred as: