exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 18 discussion

Actual exam question from CompTIA's SY0-701
Question #: 18
Topic #: 1
[All SY0-701 Questions]

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

  • A. Secured zones
  • B. Subject role
  • C. Adaptive identity
  • D. Threat scope reduction
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
SHADTECH123
Highly Voted 1 year, 6 months ago
Selected Answer: A
A. Secured Zones Explanation: In the context of implementing Zero Trust principles within the data plane, secured zones are most relevant. Zero Trust principles emphasize the need to eliminate implicit trust and enforce strict access controls. By evaluating and implementing secured zones, an organization can ensure that data is compartmentalized and that access is tightly controlled, aligning with the core tenets of Zero Trust. This approach helps to contain threats and limit lateral movement within the network, providing a strong foundation for a Zero Trust architecture.
upvoted 36 times
SHADTECH123
1 year, 6 months ago
While Threat Scope Reduction (D) is important, it is a broader concept that includes multiple strategies, not specifically focused on the data plane. Secured Zones (A) directly address data plane segmentation, a key aspect of Zero Trust to prevent unauthorized lateral movement within the network.
upvoted 6 times
...
a4e15bd
1 year, 4 months ago
Threat Scope Reduction is also relevant as it focuses on minimizing the potential attack surface and limiting the impact of any security breach. However, Secured Zones directly implements the concept of segmentation and isolation which is a foundational element of Zero Trust architecture. So the most relevant choice is Secured Zones.
upvoted 2 times
...
maxxem45
1 year, 5 months ago
According to the The Official CompTIA Security+ Study Guide (Exam SY0-701) 9th Edition, which is the latest edition, the Zero Trust Architecture is implemented in the CONTROL and DATA planes. The CONTROL plane has the Adaptive identity, Threat Scope Reduction, Policy-Driven Access Control and Policy Decision Point functions; while the DATA plane has the Subject, Policy Enforcement Point and Implicit Trusted Zones functions. In the question, the key word is "...principles within the DATA PLANE,..." and only Answer B: Subject, is in the DATA within the DATA plane.
upvoted 57 times
Konversation
7 months, 3 weeks ago
Correct. Beside the Study Guide, also the NIST Special Publication 800-207 "Zero Trust Architecture" confirms it.
upvoted 5 times
...
Innana
10 months ago
Secured zones belong to the control plane. It is stated in Comptia SYO701 exam objectives
upvoted 1 times
...
...
...
AutoroTink
Highly Voted 1 year, 6 months ago
Selected Answer: B
From Dion Training: Control Plane: Adaptive Identity, Threat Scope Reduction, Policy-Driven Access Control, and secured zones. Data Plane: Subject/system, policy engine, policy administrator, and establishing policy enforcement points. (I've also been trying to verify this from other locations...it's been a challenge!)
upvoted 28 times
7269053
3 months, 1 week ago
Ok so i compared 3 different sources for this topic Dion Training is the only one that goes it against the grain. Both Professor Messer and CompTia Sybex Study guide both include policy engine in control plane. T
upvoted 2 times
...
TKone
8 months, 1 week ago
You know how to help people understand things. Thank you very much!
upvoted 3 times
...
...
B4DGER
Most Recent 2 hours, 10 minutes ago
Selected Answer: A
This relates to network segmentation / micro-segmentation, which is EXACTLY what Zero Trust focuses on in the data plane to restrict data flows. This aligns perfectly with micro-segmentation, least privilege data access, and limiting lateral movement
upvoted 1 times
...
bicematthew
1 week, 1 day ago
Selected Answer: A
When evaluating Zero Trust within the data plane, the analyst is focusing on how data is segmented, isolated, and protected as it moves across the system.
upvoted 1 times
...
AsapRocky241
2 months ago
Selected Answer: B
Secured zones
upvoted 1 times
...
Tiz_21
2 months, 1 week ago
Selected Answer: A
Secured zones are most relevant for Zero Trust at the data plane level.
upvoted 1 times
...
FernandaCampelo
2 months, 2 weeks ago
Selected Answer: A
A. Secured zones Isso porque é exatamente onde se aplicam controles de segmentação de tráfego, isolamento e políticas de acesso granular aos dados.
upvoted 1 times
...
Empath
2 months, 2 weeks ago
Selected Answer: B
The key words are "Data Plane". The four components of the Data Plane are: Subject, System, Enterprise Resource and Policy Enforcement Point (PEP) Therefore the only possible answer is "Subject Role".
upvoted 1 times
...
7269053
3 months, 1 week ago
Selected Answer: B
This one was tricky, but now I'm leaning towards B because the data plane includes "implicit secured zones" not just secured zones.
upvoted 1 times
...
cyberTal
3 months, 3 weeks ago
Selected Answer: A
Explanation as per GPT: A. Secured Zones In the data plane (the part of the network where actual user/data traffic flows), Zero Trust principles focus on segmenting and isolating resources so only authorized traffic can pass — these are “secured zones.” Why Correct: Evaluating secured zones ensures that sensitive data paths are isolated and protected, aligning with Zero Trust’s “never trust, always verify” in the actual data flow layer. B. Subject Role This refers to the role of a user or device in determining access privileges. Why Wrong: More relevant to the control plane (access decisions) rather than the data plane where traffic segmentation happens.
upvoted 1 times
...
sentinell
4 months, 1 week ago
Selected Answer: A
- Secured zones define trusted and untrusted network areas, helping enforce Zero Trust by controlling how data flows between them. - Evaluating these zones ensures that implicit trust is eliminated, and traffic is only allowed based on strict policies and verification. The other options: - Subject role and adaptive identity are part of the control plane, which governs access decisions and policy logic. - Threat scope reduction is a strategic goal, not a direct data plane component. Want to walk through how policy enforcement points operate across these zones next?
upvoted 1 times
...
dipbhan
4 months, 2 weeks ago
Selected Answer: B
Understanding the subject role is crucial for implementing effective security measures, including Zero Trust principles. In a Zero Trust architecture, every subject must be continuously authenticated and authorized before accessing any resource, regardless of their location within the network. This approach helps ensure that only legitimate subjects can interact with sensitive data, thereby reducing the risk of unauthorized access and potential breaches.
upvoted 1 times
...
JT619
4 months, 3 weeks ago
Selected Answer: D
The most relevant factor for an analyst to evaluate when assessing Zero Trust implementation
upvoted 1 times
...
319b362
5 months, 1 week ago
Selected Answer: B
In a Zero Trust architecture, the data plane is where actual access to resources happens — such as file reads, API calls, database queries, or any operation involving protected data.
upvoted 1 times
...
Cybermatthew
5 months, 1 week ago
Selected Answer: A
Security zones are extremely relevant in implementing Zero trust principles.
upvoted 1 times
...
Jforged
5 months, 2 weeks ago
Selected Answer: A
**A. Secured Zones** In the context of the data plane, which is responsible for the movement of data, secured zones refer to the segmentation and isolation of data resources to enforce detailed access controls. This approach aligns directly with Zero Trust principles, which emphasize least privilege access, microsegmentation, and continuous verification of access requests.
upvoted 1 times
...
oreinn
5 months, 2 weeks ago
Selected Answer: D
Zero Trust principles focus on minimizing the attack surface and reducing the potential impact of a breach by assuming no inherent trust, even within the network. In the context of the data plane, which handles the actual transmission and processing of data, threat scope reduction is critical. This involves measures like micro-segmentation, least privilege access, and encrypting data in transit to limit the potential damage from unauthorized access or lateral movement within the network.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...