exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 18 discussion

Actual exam question from CompTIA's SY0-701
Question #: 18
Topic #: 1
[All SY0-701 Questions]

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

  • A. Secured zones
  • B. Subject role
  • C. Adaptive identity
  • D. Threat scope reduction
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
SHADTECH123
Highly Voted 11 months ago
Selected Answer: A
A. Secured Zones Explanation: In the context of implementing Zero Trust principles within the data plane, secured zones are most relevant. Zero Trust principles emphasize the need to eliminate implicit trust and enforce strict access controls. By evaluating and implementing secured zones, an organization can ensure that data is compartmentalized and that access is tightly controlled, aligning with the core tenets of Zero Trust. This approach helps to contain threats and limit lateral movement within the network, providing a strong foundation for a Zero Trust architecture.
upvoted 27 times
maxxem45
10 months ago
According to the The Official CompTIA Security+ Study Guide (Exam SY0-701) 9th Edition, which is the latest edition, the Zero Trust Architecture is implemented in the CONTROL and DATA planes. The CONTROL plane has the Adaptive identity, Threat Scope Reduction, Policy-Driven Access Control and Policy Decision Point functions; while the DATA plane has the Subject, Policy Enforcement Point and Implicit Trusted Zones functions. In the question, the key word is "...principles within the DATA PLANE,..." and only Answer B: Subject, is in the DATA within the DATA plane.
upvoted 37 times
Konversation
1 week, 3 days ago
Correct. Beside the Study Guide, also the NIST Special Publication 800-207 "Zero Trust Architecture" confirms it.
upvoted 1 times
...
Innana
2 months, 2 weeks ago
Secured zones belong to the control plane. It is stated in Comptia SYO701 exam objectives
upvoted 1 times
...
...
a4e15bd
8 months, 4 weeks ago
Threat Scope Reduction is also relevant as it focuses on minimizing the potential attack surface and limiting the impact of any security breach. However, Secured Zones directly implements the concept of segmentation and isolation which is a foundational element of Zero Trust architecture. So the most relevant choice is Secured Zones.
upvoted 2 times
...
SHADTECH123
11 months ago
While Threat Scope Reduction (D) is important, it is a broader concept that includes multiple strategies, not specifically focused on the data plane. Secured Zones (A) directly address data plane segmentation, a key aspect of Zero Trust to prevent unauthorized lateral movement within the network.
upvoted 5 times
...
...
AutoroTink
Highly Voted 11 months ago
Selected Answer: B
From Dion Training: Control Plane: Adaptive Identity, Threat Scope Reduction, Policy-Driven Access Control, and secured zones. Data Plane: Subject/system, policy engine, policy administrator, and establishing policy enforcement points. (I've also been trying to verify this from other locations...it's been a challenge!)
upvoted 20 times
TKone
3 weeks, 3 days ago
You know how to help people understand things. Thank you very much!
upvoted 1 times
...
...
ItAd
Most Recent 3 weeks, 3 days ago
Selected Answer: B
Zero Trust principles within the data plane focus on enforcing strict access controls to ensure that only authorized entities (subjects) can access specific data resources. Evaluating subject roles aligns with Zero Trust because: Least Privilege Access: Zero Trust enforces the principle of least privilege, meaning that access to data is granted based on predefined roles and responsibilities. Role-Based Access Control (RBAC): Subject roles define what actions a user, service, or device can perform on data within the data plane. Continuous Verification: Access is granted dynamically based on role, identity, and other contextual factors (e.g., device security posture or network conditions).
upvoted 1 times
...
gcracker618
3 weeks, 3 days ago
Selected Answer: B
This question stinks. At first I would have answered "A" as Implicit trust zones are part of the Data Plane and it was listed first. HOWEVER, the BEST answer is likely Subject role. Subject role is listed as part of data plane in much more plain, simple terms.
upvoted 1 times
...
Ejigi
1 month, 2 weeks ago
Selected Answer: C
The decision to trust is based upon adaptive identity authentication (get certified, get ahead)
upvoted 1 times
...
Oluwatobi4880
1 month, 3 weeks ago
Selected Answer: B
When evaluating the implementation of Zero Trust principles within the data plane, the most relevant factor for an analyst to evaluate would be: B. Subject role It is crucial to assess how roles and identities are managed and enforced to ensure secure access and control within the Zero Trust framework. By focusing on subject roles, the analyst can determine how access controls and permissions are applied to users, ensuring that only the right individuals have access to the necessary data, consistent with the principles of Zero Trust.
upvoted 1 times
...
KSoLL
1 month, 3 weeks ago
Selected Answer: B
B. Subject role Keywords in this question is [Data plane] & [Zero Trust] The control plane layout the policies and procedures Control plane typically encompasses several key elements: 1. Adaptive identity 2. Threat Scope Reduction 3. Policy-Driven Access Control 4.Secured Zones The data plane is going to ensure that the policies properly executed Data planes consists of: 1. Subject/System 2. Policy Enforcement Point I got this information from Jason Dion videos [Section 2: Fundamentals of Security - 15. Zero Trust (OBJ 1.2)
upvoted 1 times
...
oldbutgold
2 months ago
Selected Answer: D
Control Plane: Manages policies, including Adaptive Identity, Policy-Driven Access Control, Threat Scope Reduction, and the Policy Decision Point. (Source: CompTIA official guide - Latest) Data Plane: Implements the policies set by the control plane and includes Subject (user/device), Policy Enforcement Points, and Implicit Trusted Zones​ Source: CompTIA official guide - Latest) The question specifically asks about implementing Zero Trust principles in the data plane. The role of a subject (B) is part of the data plane, but it does not define how Zero Trust is implemented. Instead, Threat Scope Reduction (D) ensures that subject access is restricted to the minimum necessary resources, which is a key principle in the data plane.
upvoted 1 times
...
selom1
2 months ago
Selected Answer: A
It's crucial for implementing Zero Trust at the data movement level and this provides concrete controls over actual data flows
upvoted 1 times
...
gavin1776
2 months ago
Selected Answer: D
I couldn't make up my mind with all of the different answers, every AI tool said D so that's what i went with.
upvoted 1 times
...
deedee2025
2 months, 1 week ago
Selected Answer: A
I thought it was A but i see B is the most voted. can anybody explain to me why. Also who needs a reading partner to write in 3 weeks max
upvoted 1 times
...
Markie100
2 months, 1 week ago
Selected Answer: C
Yes, adaptive identity is also highly relevant when evaluating the implementation of Zero Trust principles within the data plane.
upvoted 1 times
...
suL33T
2 months, 2 weeks ago
Selected Answer: C
When evaluating the implementation of Zero Trust principles within the data plane, the analyst should focus on the Policy Enforcement Point (PEP). The PEP is a critical component of the data plane in a Zero Trust architecture. It acts as the gateway for secure access to corporate resources, enforcing adaptive access control capabilities. The PEP intercepts access requests, authenticates the requestor through the Policy Administrator (PA), and dynamically authorizes access based on policy decisions.
upvoted 1 times
...
vm_mscs
2 months, 2 weeks ago
Selected Answer: C
Specialist evaluate Zero Trust. At this stage roles shall be assigned. When user changes current zone to data zone leaving current trust level he must be get new (elevated) authorization.
upvoted 1 times
...
Rackup
2 months, 2 weeks ago
Selected Answer: D
Answer: D. Threat scope reduction Explanation: Threat scope reduction is most relevant when evaluating the implementation of Zero Trust principles, as Zero Trust focuses on minimizing the attack surface and reducing the scope of potential threats. This involves continuously verifying access and limiting user and device access based on the least privilege principle. By evaluating threat scope reduction, the analyst can ensure that resources are only accessible based on the minimal necessary access, which is a core tenet of Zero Trust architecture.
upvoted 1 times
...
bility
2 months, 3 weeks ago
Selected Answer: A
When implementing Zero Trust principles within the data plane, the focus is on controlling access to data and resources through segmentation, microsegmentation, and secured zones. These strategies help limit lateral movement and ensure that only authorized subjects
upvoted 1 times
...
babujiju
3 months ago
Selected Answer: A
The most relevant choice for evaluating the implementation of Zero Trust principles within the data plane is: A. Secured zones Explanation: Secured zones align closely with the Zero Trust principle of micro-segmentation. In the data plane, creating and enforcing secured zones means that traffic between different parts of the network is strictly controlled and inspected. This minimizes lateral movement of threats and ensures access is limited to authorized users and devices. It focuses on isolating resources and enforcing policies at a granular level, which is a core tenet of Zero Trust.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago