Use segmentation, access control, hardening, isolation, patching, and related defensive choices correctly in Security+ scenarios.
This is where Security+ checks whether you can respond with the right defensive move instead of the loudest one. Strong mitigation answers reduce the actual attack path, respect the business constraint, and avoid adding unnecessary blast radius somewhere else.
| Mitigation | When it is strongest |
|---|---|
| Segmentation | limiting lateral movement or isolating sensitive assets |
| Access control | narrowing who or what can reach the resource |
| Configuration enforcement | maintaining approved secure state consistently |
| Hardening | reducing attack surface and insecure defaults |
| Isolation | containing risky systems or suspected compromise |
| Patching | removing known exploitable weaknesses |
Security+ mitigation questions usually hide one harder judgment inside the wording:
If you answer a “first move” question with a long-term architecture improvement, you can still miss the item even if the improvement is good.
1User VLAN -> App VLAN -> Database VLAN
2Guest Wi-Fi -X-> Internal production VLAN
What to notice:
Ask these questions in order:
That sequence helps you separate:
| Scenario pattern | Strongest first direction |
|---|---|
| Active ransomware spread | isolate affected systems and reduce east-west communication |
| Repeated phishing with spoofed mail | SPF, DKIM, DMARC, filtering, and awareness together |
| Public admin portal exposed broadly | narrow access path, MFA, and logging |
| Critical system cannot be patched yet | compensating controls plus explicit risk tracking |
| Cloud data exposure through broad permissions | tighten IAM or resource policy before adding more monitoring |
1ufw allow from 10.10.50.0/24 to any port 22 proto tcp
2ufw deny 22/tcp
What to notice:
A hospital cannot immediately patch a legacy imaging server because the vendor has not approved the update and downtime would interrupt patient care. The server sits on a flat internal network and recently showed suspicious connections to workstations. Which option is strongest first?
A. Leave the system unchanged until the vendor certifies the patch
B. Move the server into a restricted segment, tighten allowed communication paths, increase monitoring, and document the residual risk
C. Disable all logging to improve server performance during patient load
D. Grant all technicians local admin so troubleshooting is faster
Best answer: B. The strongest immediate move is a compensating-control package that reduces blast radius and improves visibility while the corrective patch remains unavailable.
Continue with 3. Security Architecture to move from threat-and-control reasoning into environment and design decisions.