mediummultiple choiceObjective-mapped

A small company is redesigning its network for a public web application. The web front end must be reachable from the internet, but the database should never be exposed directly to external or general user traffic. Which architecture is the best choice?

Question 1mediummultiple choice
Full question →

A small company is redesigning its network for a public web application. The web front end must be reachable from the internet, but the database should never be exposed directly to external or general user traffic. Which architecture is the best choice?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Place both the web server and database in the same internal subnet and rely on host firewalls.

This keeps the database reachable from the web server, but it also increases the blast radius if either host is compromised.

B

Best answer

Place the web server in a DMZ and keep the database in a private internal subnet with only required application traffic allowed.

This separates the internet-facing system from the sensitive backend. The DMZ limits exposure of the web server, while the database remains inaccessible from external networks and is reachable only over tightly filtered application ports from the web tier.

C

Distractor review

Place the database in the DMZ so the web server can query it directly without internal routing.

A database in the DMZ would be unnecessarily exposed to attackers and would violate common secure architecture practices.

D

Distractor review

Keep both systems public but restrict access with NAT and strong administrator passwords.

NAT does not provide meaningful segmentation for application security, and passwords alone do not prevent network-level exposure.

Common exam trap

Common exam trap: usable hosts are not the same as total addresses

Subnetting questions often tempt you into counting all addresses. In normal IPv4 subnets, the network and broadcast addresses are not usable host addresses.

Technical deep dive

How to think about this question

Subnetting questions test whether you can identify the network, broadcast address, usable range, mask and correct subnet. Slow down enough to calculate the block size correctly.

KKey Concepts to Remember

  • CIDR notation defines the prefix length.
  • Block size helps identify subnet boundaries.
  • Network and broadcast addresses are not usable hosts in normal IPv4 subnets.
  • The required host count determines the smallest suitable subnet.

TExam Day Tips

  • Write the block size before choosing the subnet.
  • Check whether the question asks for hosts, subnets or a specific address range.
  • Do not confuse /24, /25, /26 and /27 host counts.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

CIDR notation defines the prefix length.

What is the correct answer to this question?

The correct answer is: Place the web server in a DMZ and keep the database in a private internal subnet with only required application traffic allowed. — A DMZ is the standard design for services that must be reachable from the internet while keeping sensitive back-end systems isolated. In this case, the web server belongs in the DMZ because it is the exposed layer. The database should remain on a private subnet with only the specific application ports allowed from the web server. That reduces attack surface, supports filtering, and limits lateral movement if the web server is compromised. Why others are wrong: Option A leaves the database too close to the exposed system. Option C exposes the database directly, which is a major security weakness. Option D relies on NAT and passwords, but those do not replace proper segmentation and firewall policy between tiers.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.