exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 22 discussion

Actual exam question from CompTIA's SY0-701
Question #: 22
Topic #: 1
[All SY0-701 Questions]

A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?

  • A. Implementing a bastion host
  • B. Deploying a perimeter network
  • C. Installing a WAF
  • D. Utilizing single sign-on
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
metzen227
Highly Voted 11 months, 1 week ago
Implementing a bastion host: A bastion host is a highly secured server located on a perimeter network (also known as a DMZ) that is designed to withstand attacks. It acts as a gateway between internal and external networks, allowing access only to specific services and applications. Users must authenticate themselves to the bastion host before accessing internal resources. This option provides a controlled entry point into the internal network, reducing the attack surface.
upvoted 20 times
...
Markie100
Most Recent 2 months, 1 week ago
Selected Answer: A
Implementing a bastion host is the most secure method for providing administrative access to internal resources while minimizing traffic through the security boundary. It ensures controlled, monitored, and hardened access, aligning with best practices for securing administrative workflows.
upvoted 1 times
...
_thelastturtle
2 months, 3 weeks ago
Selected Answer: B
I thought a bastion would be for external users.
upvoted 1 times
...
kai001
7 months, 1 week ago
Selected Answer: A
A bastion host is a highly secured server designed to be the single point of entry for administrative access to internal resources. It acts as a gateway, allowing administrators to connect securely to internal systems without directly exposing those systems to the outside world. Only specific, authorized traffic (e.g., SSH or RDP) is allowed, and the bastion host is heavily monitored and hardened against attacks, thus minimizing the traffic allowed through the security boundary.
upvoted 4 times
...
c469c8e
7 months, 3 weeks ago
Selected Answer: C
A bastion host is only to provide access from public to private network. Question is to provide administrative access to internal resources. This excludes bastion host. Only response is WAF
upvoted 1 times
3dk1
5 months ago
A WAF (Web application firewall) is for managing security on web applications.
upvoted 2 times
...
...
dbrowndiver
8 months, 2 weeks ago
Selected Answer: A
The bastion host serves as a hardened gateway, where all administrative access to the internal network is funneled. This limits the exposure of the internal network to only a single, secure entry point. Security Features: Bastion hosts are typically configured with strong security measures, such as multi-factor authentication, logging, and monitoring, to ensure that only authorized users can access internal resources.
upvoted 1 times
...
SHADTECH123
11 months ago
Selected Answer: A
Implementing a bastion host provides a highly secure method for administrative access to internal resources while minimizing traffic through the security boundary. It serves as a single entry point for remote administrative access, enforcing strong authentication and access controls before allowing access to internal systems.
upvoted 1 times
...
shady23
11 months, 1 week ago
Selected Answer: A
A. Implementing a bastion host The keyword in the question that makes option A correct is "minimizing the traffic allowed through the security boundary." Implementing a bastion host allows for strict control over inbound traffic from external networks by acting as a single point of entry. Users connect to the bastion host, and from there, access to internal resources is provided. This setup minimizes the direct traffic flow to internal resources, as all external access is channeled through the bastion host, which can enforce security measures such as authentication, authorization, and logging. This effectively reduces the amount of traffic allowed through the security boundary while still providing access to internal resources for administrative purposes.
upvoted 3 times
...
e5c1bb5
11 months, 1 week ago
Selected Answer: A
so from my understanding the bastion host and jump server are similar if not the name. the bastion host is not on the exam objectives. i think ill still go with A because it is the most secure. maybe its a no credit question?
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago