exam questions

Exam SY0-701 All Questions

View all questions & answers for the SY0-701 exam

Exam SY0-701 topic 1 question 18 discussion

Actual exam question from CompTIA's SY0-701
Question #: 18
Topic #: 1
[All SY0-701 Questions]

An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?

  • A. Secured zones
  • B. Subject role
  • C. Adaptive identity
  • D. Threat scope reduction
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
SHADTECH123
Highly Voted 11 months, 2 weeks ago
Selected Answer: A
A. Secured Zones Explanation: In the context of implementing Zero Trust principles within the data plane, secured zones are most relevant. Zero Trust principles emphasize the need to eliminate implicit trust and enforce strict access controls. By evaluating and implementing secured zones, an organization can ensure that data is compartmentalized and that access is tightly controlled, aligning with the core tenets of Zero Trust. This approach helps to contain threats and limit lateral movement within the network, providing a strong foundation for a Zero Trust architecture.
upvoted 28 times
maxxem45
10 months, 2 weeks ago
According to the The Official CompTIA Security+ Study Guide (Exam SY0-701) 9th Edition, which is the latest edition, the Zero Trust Architecture is implemented in the CONTROL and DATA planes. The CONTROL plane has the Adaptive identity, Threat Scope Reduction, Policy-Driven Access Control and Policy Decision Point functions; while the DATA plane has the Subject, Policy Enforcement Point and Implicit Trusted Zones functions. In the question, the key word is "...principles within the DATA PLANE,..." and only Answer B: Subject, is in the DATA within the DATA plane.
upvoted 41 times
Konversation
3 weeks, 6 days ago
Correct. Beside the Study Guide, also the NIST Special Publication 800-207 "Zero Trust Architecture" confirms it.
upvoted 2 times
...
Innana
3 months ago
Secured zones belong to the control plane. It is stated in Comptia SYO701 exam objectives
upvoted 1 times
...
...
a4e15bd
9 months, 2 weeks ago
Threat Scope Reduction is also relevant as it focuses on minimizing the potential attack surface and limiting the impact of any security breach. However, Secured Zones directly implements the concept of segmentation and isolation which is a foundational element of Zero Trust architecture. So the most relevant choice is Secured Zones.
upvoted 2 times
...
SHADTECH123
11 months, 2 weeks ago
While Threat Scope Reduction (D) is important, it is a broader concept that includes multiple strategies, not specifically focused on the data plane. Secured Zones (A) directly address data plane segmentation, a key aspect of Zero Trust to prevent unauthorized lateral movement within the network.
upvoted 5 times
...
...
AutoroTink
Highly Voted 11 months, 3 weeks ago
Selected Answer: B
From Dion Training: Control Plane: Adaptive Identity, Threat Scope Reduction, Policy-Driven Access Control, and secured zones. Data Plane: Subject/system, policy engine, policy administrator, and establishing policy enforcement points. (I've also been trying to verify this from other locations...it's been a challenge!)
upvoted 21 times
TKone
1 month, 1 week ago
You know how to help people understand things. Thank you very much!
upvoted 1 times
...
...
monstamash
Most Recent 4 days, 5 hours ago
Selected Answer: B
In Zero Trust, everything must be verified — not just the network location but who the user or system (the "subject") is, and what role they have. When evaluating the data plane (where actual access to resources like data or applications happens), evaluating the subject's role ensures only authorized roles can access specific data or services. This matches the principle of least privilege, a core part of Z
upvoted 1 times
...
8f23125
1 week, 4 days ago
Selected Answer: B
Defines what access a user or service (subject) has to data based on their role. Highly relevant—Zero Trust enforces least-privilege access based on role, identity, and context.
upvoted 1 times
...
158e3e5
2 weeks, 1 day ago
Selected Answer: B
B. Subject Role
upvoted 1 times
...
ItAd
1 month, 1 week ago
Selected Answer: B
Zero Trust principles within the data plane focus on enforcing strict access controls to ensure that only authorized entities (subjects) can access specific data resources. Evaluating subject roles aligns with Zero Trust because: Least Privilege Access: Zero Trust enforces the principle of least privilege, meaning that access to data is granted based on predefined roles and responsibilities. Role-Based Access Control (RBAC): Subject roles define what actions a user, service, or device can perform on data within the data plane. Continuous Verification: Access is granted dynamically based on role, identity, and other contextual factors (e.g., device security posture or network conditions).
upvoted 1 times
...
gcracker618
1 month, 1 week ago
Selected Answer: B
This question stinks. At first I would have answered "A" as Implicit trust zones are part of the Data Plane and it was listed first. HOWEVER, the BEST answer is likely Subject role. Subject role is listed as part of data plane in much more plain, simple terms.
upvoted 1 times
...
Ejigi
2 months ago
Selected Answer: C
The decision to trust is based upon adaptive identity authentication (get certified, get ahead)
upvoted 1 times
...
Oluwatobi4880
2 months, 1 week ago
Selected Answer: B
When evaluating the implementation of Zero Trust principles within the data plane, the most relevant factor for an analyst to evaluate would be: B. Subject role It is crucial to assess how roles and identities are managed and enforced to ensure secure access and control within the Zero Trust framework. By focusing on subject roles, the analyst can determine how access controls and permissions are applied to users, ensuring that only the right individuals have access to the necessary data, consistent with the principles of Zero Trust.
upvoted 1 times
...
KSoLL
2 months, 1 week ago
Selected Answer: B
B. Subject role Keywords in this question is [Data plane] & [Zero Trust] The control plane layout the policies and procedures Control plane typically encompasses several key elements: 1. Adaptive identity 2. Threat Scope Reduction 3. Policy-Driven Access Control 4.Secured Zones The data plane is going to ensure that the policies properly executed Data planes consists of: 1. Subject/System 2. Policy Enforcement Point I got this information from Jason Dion videos [Section 2: Fundamentals of Security - 15. Zero Trust (OBJ 1.2)
upvoted 1 times
...
oldbutgold
2 months, 2 weeks ago
Selected Answer: D
Control Plane: Manages policies, including Adaptive Identity, Policy-Driven Access Control, Threat Scope Reduction, and the Policy Decision Point. (Source: CompTIA official guide - Latest) Data Plane: Implements the policies set by the control plane and includes Subject (user/device), Policy Enforcement Points, and Implicit Trusted Zones​ Source: CompTIA official guide - Latest) The question specifically asks about implementing Zero Trust principles in the data plane. The role of a subject (B) is part of the data plane, but it does not define how Zero Trust is implemented. Instead, Threat Scope Reduction (D) ensures that subject access is restricted to the minimum necessary resources, which is a key principle in the data plane.
upvoted 1 times
...
selom1
2 months, 2 weeks ago
Selected Answer: A
It's crucial for implementing Zero Trust at the data movement level and this provides concrete controls over actual data flows
upvoted 1 times
...
gavin1776
2 months, 3 weeks ago
Selected Answer: D
I couldn't make up my mind with all of the different answers, every AI tool said D so that's what i went with.
upvoted 2 times
...
deedee2025
2 months, 3 weeks ago
Selected Answer: A
I thought it was A but i see B is the most voted. can anybody explain to me why. Also who needs a reading partner to write in 3 weeks max
upvoted 1 times
...
Markie100
2 months, 3 weeks ago
Selected Answer: C
Yes, adaptive identity is also highly relevant when evaluating the implementation of Zero Trust principles within the data plane.
upvoted 1 times
...
suL33T
3 months ago
Selected Answer: C
When evaluating the implementation of Zero Trust principles within the data plane, the analyst should focus on the Policy Enforcement Point (PEP). The PEP is a critical component of the data plane in a Zero Trust architecture. It acts as the gateway for secure access to corporate resources, enforcing adaptive access control capabilities. The PEP intercepts access requests, authenticates the requestor through the Policy Administrator (PA), and dynamically authorizes access based on policy decisions.
upvoted 1 times
...
vm_mscs
3 months ago
Selected Answer: C
Specialist evaluate Zero Trust. At this stage roles shall be assigned. When user changes current zone to data zone leaving current trust level he must be get new (elevated) authorization.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago