A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder cannot access the intranet. Which
of the following security techniques should be used?
Place them behind honeypots
Place them in a separate subnet
Place them between two internal firewalls
Place them in the demilitarized zone