D is correct. A jump server is a server placed between different security
zones, such as an internal network and a screened subnet (sometimes called
a demilitarized zone or DMZ) and is used to manage devices in the other
security zone. In this scenario, administrators could connect to the jump
server with Secure Shell (SSH) and then connect to the Linux server using
SSH forwarding on the jump server. A forward proxy server (often called a
proxy server) is used by internal clients to access Internet resources, not
resources in the screened subnet. Reverse proxy servers accept traffic from
the Internet, not the internal network, and forward the traffic to one or more
internal web servers. A web application firewall (WAF) protects a web
server from Internet-based attacks but isn’t used to control traffic between
an internal network and the screened subnet. See Chapter 3.