Master firewall types, network segmentation strategies, intrusion detection vs. prevention, and secure remote access β with scenario-based quizzes and a design selector tool built for SY0-701.
π― Take the Practice QuizDomain 3 (Security Architecture) is 18% of the SY0-701 exam. It focuses on where controls are placed in the network and why β using layered defense to limit the blast radius of a breach.
Control which traffic is allowed between network zones. Classified by what they inspect and which OSI layers they operate on.
Splits networks into zones to contain breaches, limit lateral movement, and apply different security policies per zone.
Monitor network or host traffic for malicious activity. IDS alerts; IPS actively blocks. Placement and detection method are key exam topics.
Ensures only authorized, authenticated users and devices access network resources β both remotely and on-premises.
The exam asks you to match the right control to the right problem. An IDS monitors but doesn't stop attacks. A WAF protects web apps but not internal traffic. A VLAN isolates but doesn't encrypt. Know what each control does β and more importantly, what it doesn't do.
The distinguishing attributes, placement logic, and exam traps for each network security control category.
Filter by control category or view all together. Focus on what each control does vs. what it doesn't do β the most common exam trap.
| Criterion | π₯ Firewalls | πΊοΈ Segmentation | ποΈ IDS/IPS | π Secure Access |
|---|---|---|---|---|
| Primary Function | Control traffic flow between zones based on rules | Divide the network into isolated zones to contain breaches | Monitor traffic for malicious activity; IPS blocks it | Authenticate and authorize users/devices before granting network access |
| Active Blocking? | β Yes β drops packets per rules | β Partially β traffic between zones is blocked by design | IDS: β No Β· IPS: β Yes | β Yes β unauthenticated devices denied access |
| OSI Layer | Packet filter: L3/4 Β· Stateful: L4 Β· NGFW/WAF: L7 | VLAN: L2 Β· DMZ/subnets: L3 Β· Microseg: L3β7 | NIDS/NIPS: L3β7 Β· HIDS/HIPS: All layers on host | 802.1X: L2 Β· VPN IPSec: L3 Β· SSL VPN: L4β7 |
| Addresses Lateral Movement? | β οΈ Partially β if internal zones have firewalls between them | β Yes β microsegmentation directly targets east-west traffic | β Yes (IPS) β detects and blocks lateral movement patterns | β Yes β Zero Trust requires re-auth for every lateral move |
| Detects Zero-Days? | β No β rules are manually defined | β No β limits blast radius but doesn't detect | Signature: β No Β· Anomaly: β Yes | β No β controls access, not attack detection |
| Key Limitation | WAF: only HTTP Β· Packet filter: no state Β· NGFW: complex, expensive | VLAN: doesn't encrypt Β· Air gap: inconvenient Β· DMZ: doesn't help east-west | IDS: can't stop attacks Β· Anomaly: false positives Β· Signature: misses new attacks | Split tunneling: security risk Β· VPN: perimeter-only (vs. Zero Trust) |
| Exam Keyword | "SQL injection protection" = WAF Β· "Application-aware" = NGFW Β· "Stateless" = packet filter | "Public-facing servers" = DMZ Β· "Separate broadcast domains" = VLAN Β· "No network connection" = air gap | "Alerts only, doesn't block" = IDS Β· "Inline, blocks traffic" = IPS Β· "Zero-day detection" = anomaly-based | "Never trust, always verify" = Zero Trust Β· "Port authentication" = 802.1X Β· "Admin access intermediary" = jump server |
| Typical Placement | Network perimeter, between zones, in front of web servers (WAF) | Entire network architecture β DMZ at edge, VLANs throughout, air gap at most sensitive systems | IDS: on a SPAN/TAP port Β· IPS: inline between zones or at perimeter | VPN: perimeter Β· 802.1X: switch/access point ports Β· Jump server: inside restricted segment |
Read each scenario and identify the correct control before checking the breakdown β mirrors the SY0-701 scenario question format.
10 scenario-based questions with per-category breakdown β built around actual SY0-701 scenario question patterns.
Answer 2β3 questions to identify the most appropriate network security control for your scenario.
Click each card to flip it and reveal the mnemonic.
π Tap a card to flip
| If the exam says⦠| Key detail | Answer |
|---|---|---|
| "Protect web app from SQL injection / XSS" | HTTP/HTTPS only, Layer 7 | WAF |
| "Application-aware, DPI, user identity tracking" | All traffic, Layer 7 | NGFW |
| "Tracks connection state, blocks out-of-state packets" | State table, Layer 4 | Stateful Firewall |
| "Public-facing servers," "buffer zone between internet and LAN" | Screened subnet = DMZ | DMZ / Screened Subnet |
| "Separate broadcast domains," "logical separation on a switch" | Layer 2 logical | VLAN |
| "No network connection," "SCADA," "nuclear," "classified" | Physical isolation | Air Gap |
| "Lateral movement," "east-west traffic," "workload isolation" | Fine-grained, SDN | Microsegmentation |
| "Alerts only," "does not block," "monitor for forensics" | Passive, out-of-band | IDS (NIDS/HIDS) |
| "Inline," "blocks in real time," "drops malicious packets" | Active, in-path | IPS (NIPS/HIPS) |
| "Detects zero-days," "behavioral baseline," "more false positives" | Deviation from normal | Anomaly-based IDS/IPS |
| "Never trust, always verify," "no implicit trust by location" | Identity-centric model | Zero Trust Architecture |
| "Port authentication," "device must authenticate before LAN access" | IEEE standard, RADIUS | 802.1X / NAC |
| "Admin access intermediary," "jump to internal systems" | Single audited access point | Jump Server / Bastion Host |
| "Split tunneling" (in a security context) | Risk: direct internet + VPN | β οΈ Security Risk β avoid |