Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA CertMaster Security+ SY0-701 Domain 3.0 Security Architecture Assessment Exam with verified solutions

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
09-01-2026
Written in
2025/2026

CompTIA CertMaster Security+ SY0-701 Domain 3.0 Security Architecture Assessment Exam with verified solutions

Institution
CompTIA Security CertMaster
Course
CompTIA Security CertMaster

Content preview

2



CompTIA CertMaster Security+ SY0-701 Domain 3.0 || || || || || ||




Security Architecture Assessment Exam with verified || || || || || ||




solutions

A company is deploying a software service to monitor traffic and enforce security policies in its
|| || || || || || || || || || || || || || || ||




cloud environment. Considering the need for responsiveness, which technology should the
|| || || || || || || || || || ||




company consider using? - ✔✔Serverless platforms and software-defined networking (SDN)
|| || || || || || || || ||




The IT manager of a medium-sized organization is designing a new network infrastructure to
|| || || || || || || || || || || || || ||




secure its enterprise infrastructure by implementing an Intrusion Prevention System (IPS) and an
|| || || || || || || || || || || || ||




Intrusion Detection System (IDS). The manager is considering different deployment methods for
|| || || || || || || || || || || ||




the IPS/IDS to optimize their effectiveness. The organization's network includes multiple security
|| || || || || || || || || || || ||




zones, a virtual private network (VPN) for remote access, and a web application firewall (WAF).
|| || || || || || || || || || || || || || ||




Which deployment method provides the MOST comprehensive protection in this scenario? -
|| || || || || || || || || || || ||




✔✔Deploy the IPS/IDS devices in inline mode at the network perimeter. || || || || || || || || || ||




A hospital is putting measures in place to protect patient records. Which term BEST describes
|| || || || || || || || || || || || || || ||




how the hospital should classify patient data? - ✔✔Sensitive
|| || || || || || || ||




A multinational company is improving its data security strategy and asks an IT professional to
|| || || || || || || || || || || || || || ||




apply different protective measures, ensuring that the data remains secure, whether stored,
|| || || || || || || || || || || ||




transferred, or processed. What refers to the various aspects of data, such as "at rest", "in transit",
|| || || || || || || || || || || || || || || || ||




or "in use"? - ✔✔Data states
|| || || || ||




A company is redesigning its network architecture and wants to implement a zone-based security
|| || || || || || || || || || || || || ||




model. Which of the following is the MOST accurate statement about hosts within the same zone?
|| || || || || || || || || || || || || || ||




- ✔✔Hosts within the same zone should be subject to the same access control requirements.
|| || || || || || || || || || || || || || ||




A global banking institution instructs its cybersecurity team to minimize the network's
|| || || || || || || || || || || ||




vulnerability to cyber threats. The team has divided the network into secure segments, initiated || || || || || || || || || || || || || ||




port security protocols, and physically segregated key servers. The team now wishes to manage
|| || || || || || || || || || || || || ||




the flow of traffic between the security segments to reduce the threat of attack. What approach
|| || || || || || || || || || || || || || || ||

, 2


should the cybersecurity team adopt? - ✔✔Enforce role-based access control for traffic policies
|| || || || || || || || || || || || ||




between zones. ||




A cyber analyst drafts a briefing sheet on the application of security principles to secure enterprise
|| || || || || || || || || || || || || || ||




infrastructures with an emphasis on device attributes. What is directly attributed to detective and
|| || || || || || || || || || || || || || ||




preventive security controls that use an agent or network configuration to monitor hosts? -
|| || || || || || || || || || || || || ||




✔✔Active security control || ||




A small logistics company is contemplating certain steps for its data centers in its quest to fortify
|| || || || || || || || || || || || || || || || ||




its systems against long-term power outages. What is the MOST suitable measure the company
|| || || || || || || || || || || || || ||




could undertake? - ✔✔Deploying onsite generators
|| || || || ||




A medium-sized organization is upgrading its network infrastructure to secure its enterprise
|| || || || || || || || || || || ||




infrastructure by implementing an intrusion prevention system (IPS) and an intrusion detection || || || || || || || || || || || ||




system (IDS). The organization has sensitive data in different security zones, and the IT manager
|| || || || || || || || || || || || || || ||




has concerns regarding the attack surface and network connectivity. Which of the following
|| || || || || || || || || || || || ||




placements of the IPS/IDS devices would be MOST effective in this scenario? - ✔✔Place the
|| || || || || || || || || || || || || || ||




IPS/IDS devices at the network perimeter to monitor inbound and outbound traffic.
|| || || || || || || || || || ||




A financial organization is currently handling a document that contains sensitive customer
|| || || || || || || || || || || ||




information, which is protected by a non-disclosure agreement. According to data classifications,
|| || || || || || || || || || || ||




how should the financial organization categorize this data? - ✔✔Confidential data
|| || || || || || || || || ||




A security engineer is updating the company's cyber security strategy. Which of the following
|| || || || || || || || || || || || || ||




strategies is the MOST effective in reducing the company's network attack surface? -
|| || || || || || || || || || || || ||




✔✔Establish multiple control categories and functions to enforce multiple layers of protection. || || || || || || || || || || ||




A multinational corporation wants to standardize and automate the setup of its Information
|| || || || || || || || || || || || ||




Technology (IT) infrastructure across various branches. This would reduce manual setup errors
|| || || || || || || || || || || ||




and allow for quicker deployment and scaling of resources as per demand. Which methodology
|| || || || || || || || || || || || || ||




should the corporation adopt to accomplish this? - ✔✔Infrastructure as code
|| || || || || || || || || ||

Written for

Institution
CompTIA Security CertMaster
Course
CompTIA Security CertMaster

Document information

Uploaded on
January 9, 2026
Number of pages
10
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$16.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ruiz Liberty University
Follow You need to be logged in order to follow users or courses
Sold
96
Member since
1 year
Number of followers
1
Documents
13886
Last sold
1 week ago
Top-Quality Study Materials for Success – Ace Your Exams with Expert Resources!

Access high-quality study materials to help you excel in your exams. Get notes, summaries, and guides tailored to your courses!

3.2

15 reviews

5
4
4
4
3
2
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions