Learn how Security+ frames firewall changes, IDS/IPS, DNS filtering, DLP, NAC, and EDR/XDR tuning in operations scenarios.
Security+ expects you to recognize what enterprise security controls do well and what they do not solve on their own. The exam often presents a noisy or risky scenario and asks which control to modify or deploy first. Strong answers match the control to the layer of the problem.
IPS: Intrusion prevention system, a control that can block malicious traffic inline instead of only observing it.
XDR: Extended detection and response, a broader detection and investigation layer that links signals across endpoints, identities, email, and network sources.
WAF: Web application firewall, a control designed for HTTP or HTTPS traffic and common web-application attack patterns.
CompTIA is usually testing whether you can map the problem to the right control plane:
The wrong answer is often still a real security tool. It just operates at the wrong layer for the scenario.
| Control | Best fit |
|---|---|
| Firewall | allow or deny traffic by rule and zone |
| IDS/IPS | detect or block malicious traffic patterns |
| DNS filtering | reduce malicious domain resolution and user browsing risk |
| DLP | monitor or restrict sensitive data movement |
| NAC | restrict network admission based on identity or posture |
| EDR/XDR | endpoint visibility, investigation, and response |
| Scenario clue | Strongest first fit | Why |
|---|---|---|
| Known malicious traffic must be blocked inline | IPS | The requirement is prevention, not observation |
| Users keep reaching phishing and malware domains | DNS filtering or secure web controls | The browsing path is the problem |
| Sensitive records are leaving through email or cloud sharing | DLP | The core concern is data movement |
| Unknown device wants internal network access | NAC | Admission control happens before broad reachability |
| Host behavior is suspicious after execution | EDR or XDR | The signal lives on the endpoint |
1allow tcp 443 from 203.0.113.0/24 to 10.0.10.20
2deny any any to 10.0.10.20
What to notice:
These controls are related, but Security+ likes to see whether you can separate them:
If the scenario mentions SQL injection, XSS, or suspicious web requests, a WAF answer is often stronger than a generic network-firewall answer.
Strong answers often combine controls without mixing their jobs:
That layered model is why Security+ treats enterprise controls as operational decisions rather than one-device answers.
A company discovers that employees are clicking malicious links in email and then attempting to browse newly registered domains that host credential-harvesting pages. The security team wants the fastest control that reduces user exposure before broader awareness retraining is complete. Which answer is strongest?
A. Replace the backup software
B. Enable DNS filtering or secure web controls to block suspicious destination domains and keep email protections in place
C. Remove MFA because it causes user friction
D. Move the payroll database to a warm site
Best answer: B. The immediate path being abused is outbound browsing to malicious destinations after message delivery. DNS filtering or secure web controls reduce that reachability quickly.
Continue with 4.6 Identity & Access Operations to connect enterprise controls to day-to-day access lifecycle decisions.