Use network segmentation to separate trust zones and limit blast radius across guest, user-owned, and operational technology environments.
Segmentation questions are trust-boundary questions. CompTIA is not just asking whether you know what a VLAN is. It is asking whether you can decide which device populations should share a network, which should be isolated, and where convenience has to give way to containment and safety.
OT: Operational technology, the systems that monitor or control physical processes such as manufacturing or utilities.
BYOD: Bring your own device, a personally owned endpoint that is allowed to connect under defined policy.
IoT: Internet of Things, embedded devices such as cameras, sensors, printers, or controllers that often have limited security features.
The strongest answers usually separate:
flowchart LR
A["Guest devices"] --> G["Guest zone"]
B["Managed staff devices"] --> H["Corporate user zone"]
C["IoT devices"] --> I["IoT zone"]
D["OT systems"] --> J["OT zone"]
G --> K["Internet only or tightly restricted access"]
H --> L["Approved internal services"]
I --> M["Only required controllers or services"]
J --> N["Strictly limited operational paths"]
What to notice:
| Zone type | Typical rule of thumb |
|---|---|
| guest | internet access with minimal or no internal reachability |
| BYOD | restricted access, usually narrower than for managed corporate endpoints |
| IoT | only the exact controllers, services, or update paths required |
| OT | tightly controlled access with strong separation from ordinary user traffic |
1VLAN 10 Corporate users
2VLAN 20 Guest wireless
3VLAN 30 IoT cameras
4VLAN 40 OT controllers
5
6Guest -> internet only
7IoT -> NVR and update service only
8OT -> management jump host and required controllers only
What to notice:
CompTIA likes scenarios where two answers both sound secure, but one is more precise:
Continue with 4.7 Network Attacks & Adversary Techniques to keep the domain flow intact.