Mechanisms exist to monitor De-Militarized Zone (DMZ) network segments to separate untrusted networks from trusted networks.
Does the organization monitor De-Militarized Zone (DMZ) network segments to separate untrusted networks from trusted networks?