Learn how Security+ frames segmentation, secure access, communication paths, and control selection for enterprise infrastructure.
Security+ architecture questions often reduce to one design problem: how should communication and access be structured so compromise is harder, detection is easier, and operations still work. Strong answers usually rely on segmentation, clear trust boundaries, and narrow access paths rather than flat reachability.
DMZ: Demilitarized zone, a segmented network area that exposes public-facing services without placing them directly on the internal network.
WAF: Web application firewall, a control placed in front of web apps to inspect and filter HTTP or HTTPS traffic.
802.1X: A network access control standard used to authenticate devices or users before granting network access.
CompTIA is usually testing whether you can match the control layer to the path being protected:
802.1X, posture checks, rogue-device detectionThe weak answer is often the one that secures one path well and leaves the more dangerous path wide open.
| Pattern | Why it matters |
|---|---|
| Segmentation and microsegmentation | limit blast radius and lateral movement |
| DMZ or controlled public edge | separate public-facing systems from internal assets |
| VPN and secure remote access | protect remote connectivity and admin access |
| NAC and 802.1X | validate users or devices before network access |
| Secure wireless design | protect internal access paths and reduce rogue access risk |
| WAF and reverse proxy placement | protect exposed web applications at the right layer |
flowchart LR
I["Internet"] --> W["WAF / reverse proxy"]
W --> D["DMZ or app tier"]
D --> A["Internal application zone"]
A --> B["Restricted data zone"]
What to notice:
| Requirement | Strongest first fit | Why |
|---|---|---|
| Protect a public web app from common web attacks | WAF in front of the app tier | The attack layer is HTTP and application behavior |
| Restrict remote administration | VPN plus MFA and narrow admin-path rules | Administrative exposure is often the highest-risk path |
| Keep unmanaged devices off the network | NAC or 802.1X |
Admission control happens before broader access is granted |
| Reduce blast radius inside the network | Segmentation or microsegmentation | Limits east-west spread after compromise |
| Separate public-facing services from sensitive internal systems | DMZ or controlled edge tier | Keeps direct internet traffic away from sensitive zones |
flowchart LR
A["Admin device"] --> B["VPN gateway with MFA"]
B --> C["Jump host or management subnet"]
C --> D["Restricted management interface"]
What to notice:
1ufw allow 443/tcp
2ufw allow from 10.20.30.0/24 to any port 22 proto tcp
3ufw deny 22/tcp
What to notice:
Many scenario questions hide the real issue in administrative access:
If a solution secures customer traffic but leaves management traffic wide open, it is usually incomplete.
A company hosts a customer portal on the internet. Administrators also need remote management access to the application servers. Which design is strongest?
A. Expose both the customer portal and SSH management directly to the internet because TLS is enabled
B. Put the customer portal behind the right edge protection, keep application and data tiers segmented, and require a narrow MFA-protected admin path for management
C. Place the database in the same unrestricted zone as the public web server to reduce latency
D. Disable network segmentation because internal traffic is already trusted
Best answer: B. The strongest design separates customer traffic from administrative traffic and keeps sensitive internal systems behind layered controls.
Continue with 3.3 Data Protection & Classification to connect infrastructure design to what the organization is actually trying to protect.