Ron has configured his network to provide strong perimeter security. As part of his network architecture,
he has included a host that is fully
exposed to attack. The system is on the public side of the demilitarized zone, unprotected by a firewall or
filtering router. What would you call such a host?
What is the answer of this question ? and why ?