Which of the following should be considered when implementing a DMZ?

A DMZ can only monitor a web server.
A DMZ has no power after a network has been penetrated.
A DMZ can be used to monitor only internal traffic.
A DMZ can only monitor one computer at a time.