Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security+ SY0-701 3.0 Security Architecture exam with correct answers

Rating
-
Sold
-
Pages
38
Grade
A+
Uploaded on
17-04-2026
Written in
2025/2026

CompTIA Security+ SY0-701 3.0 Security Architecture exam with correct answers

Institution
CompTIA Security+ SY0-701
Course
CompTIA Security+ SY0-701

Content preview

CompTIA Security+ SY0-701 ||\\||\\ ||\\||\\ ||\\||\\




3.0 Security Architecture exam ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




with correct answers ||\\||\\ ||\\||\\




Data Classification ||\\||\\




Based on the organization's value and the sensitivity of
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




the information if it were to be disclosed
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Data Classifications ||\\||\\




1. Sensitive
||\\||\\




2. Confidential
||\\||\\




3. Public
||\\||\\




4. Restricted
||\\||\\




5. Private
||\\||\\




6. Critical
||\\||\\




Security Infrastructure ||\\||\\




Combination of software, hardware, policies, and ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




practices that organizations use to protect information ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Intrusion Detection System (IDS) ||\\||\\ ||\\||\\ ||\\||\\




Logs and alerts suspicious activity
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\

,Network IDS (NIDS) ||\\||\\ ||\\||\\




Responsible for detection unauthorized network access or ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




attacks
||\\||\\




IPSec
A protocol suite for secure communication through
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




authentication and data packets in IP networks ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




IPSec Transport Mode ||\\||\\ ||\\||\\




Employs the original IP header ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Software-Defined Wide Area Network (SD-WAN) ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Virtualized approach to managing and optimizing wide ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




area network connections to efficiently route traffic
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




between remote sites, data centers, and cloud ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




environments
Security Zone ||\\||\\




Distinct segment within a network often created by ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




logically isolating the segment using a firewall or other ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




security device ||\\||\\




Attack Surface of a Network ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Refers to all the points where an unauthorized user can ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




try to enter data to extract data from an environment
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\

,Active Device ||\\||\\




Monitors and acts on malicious traffic ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Passive Device ||\\||\\




Monitors and reports, but does not act ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Inline Device ||\\||\\




Tap/Monitor Device ||\\||\\




Operates discreetly outside a network path without ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




impacting traffic ||\\||\\




Fail Mode ||\\||\\




Determines how a device behaves in a failure ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Fail Modes ||\\||\\




1. Fail-Closed
||\\||\\




2. Fail-Open
||\\||\\




Fail-Open
Allows all traffic in the event of a failure to ensure there's
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




no disruption to network services
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Least Privlidge ||\\||\\




Users or systems are granted only the necessary access
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




rights

, Defense in Depth ||\\||\\ ||\\||\\




Using multiple layers of security ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Risk-Based Approach ||\\||\\




Prioritizing controls based on potential risks and ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




vulnerabilities specific to the infrastructure to make ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




efficient use of resources ||\\||\\ ||\\||\\ ||\\||\\




Lifecycle Management ||\\||\\




Regularly review, update, and retire controls to adapt to ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




evolving threats ||\\||\\




Open Design Principle ||\\||\\ ||\\||\\




Ensuring transparency and accountability through ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




rigorous testing and scrutiny of infrastructure and controls
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Control
A protective measure put in place to reduce potential risks
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




and safeguard an organization's assets
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Fail-Closed
Blocks all traffic in the event of a failure ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\




Connectivity

Written for

Institution
CompTIA Security+ SY0-701
Course
CompTIA Security+ SY0-701

Document information

Uploaded on
April 17, 2026
Number of pages
38
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$35.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
progrades Walden University
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
8 months
Number of followers
0
Documents
3694
Last sold
1 day ago

4.0

2 reviews

5
1
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions