mediummultiple choiceObjective-mapped

Exhibit

Topology and ACL summary:
Internet -> Firewall -> DMZ VLAN 10: reverse proxy
Private App VLAN 20: application server 10.10.20.20
Private DB VLAN 30: database server 10.10.30.30
User VLAN 40: internal workstations

ACL summary:
1. permit tcp any -> 10.10.10.10 eq 443
2. permit tcp 10.10.10.10 -> 10.10.20.20 eq 8443
3. permit tcp 10.10.20.20 -> 10.10.30.30 eq 1433
4. deny ip any -> 10.10.30.30

Based on the exhibit, which change best reduces exposure for the public web application while keeping the backend tiers protected?

The current design is: Internet -> Firewall -> DMZ VLAN 10: reverse proxy Private App VLAN 20: application server 10.10.20.20 Private DB VLAN 30: database server 10.10.30.30 User VLAN 40: internal workstations

ACL summary: 1. permit tcp any -> 10.10.10.10 eq 443 2. permit tcp 10.10.10.10 -> 10.10.20.20 eq 8443 3. permit tcp 10.10.20.20 -> 10.10.30.30 eq 1433 4. deny ip any -> 10.10.30.30

Question 1mediummultiple choice
Full question →

Based on the exhibit, which change best reduces exposure for the public web application while keeping the backend tiers protected?

The current design is: Internet -> Firewall -> DMZ VLAN 10: reverse proxy Private App VLAN 20: application server 10.10.20.20 Private DB VLAN 30: database server 10.10.30.30 User VLAN 40: internal workstations

ACL summary: 1. permit tcp any -> 10.10.10.10 eq 443 2. permit tcp 10.10.10.10 -> 10.10.20.20 eq 8443 3. permit tcp 10.10.20.20 -> 10.10.30.30 eq 1433 4. deny ip any -> 10.10.30.30

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Move the database server into the DMZ so the public proxy can reach it directly.

This would increase risk by exposing the database tier closer to the Internet-facing zone. Databases should be among the most protected assets in a multi-tier design, not placed where they are easier to reach from untrusted networks.

B

Best answer

Keep the reverse proxy in the DMZ and place the application and database servers in private subnets behind it.

This is the best design because it limits Internet exposure to the reverse proxy while keeping the application and database tiers segmented behind internal controls. The proxy can forward only approved traffic to the app tier, and the app tier can talk to the database through tightly defined rules. That preserves function while reducing the attack surface of the more sensitive backend systems.

C

Distractor review

Allow inbound Internet access directly to the application server on 8443, but restrict the database.

Directly exposing the application server creates an unnecessary entry point from the Internet. Even if the database stays restricted, the application server becomes a target for scanning, exploitation, and web attack traffic that the reverse proxy could have absorbed.

D

Distractor review

Collapse all servers into one VLAN and rely on strong passwords for protection.

This removes segmentation entirely and does not address network-level exposure. Strong passwords are important, but they cannot replace isolation between public, application, and database systems in a secure architecture.

Common exam trap

Common exam trap: an active trunk can still block the VLAN you need

A trunk being up does not prove every VLAN is crossing it. Check allowed VLAN lists, native VLAN mismatch, VLAN existence and access-port assignment.

Technical deep dive

How to think about this question

VLAN questions usually combine access-port and trunking clues. The key is to identify whether the issue is local to one switchport, caused by the trunk, or caused by the VLAN not existing where it needs to exist.

KKey Concepts to Remember

  • Access ports place end devices into a single VLAN.
  • Trunk ports carry multiple VLANs between switches.
  • Allowed VLAN lists decide which VLANs can cross a trunk.
  • Native VLAN mismatch can create confusing symptoms.

TExam Day Tips

  • Use show vlan brief to verify access VLANs.
  • Use show interfaces trunk to verify trunk state and allowed VLANs.
  • Do not treat every same-VLAN issue as a routing problem.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Access ports place end devices into a single VLAN.

What is the correct answer to this question?

The correct answer is: Keep the reverse proxy in the DMZ and place the application and database servers in private subnets behind it. — The exhibit shows a classic three-tier design, and the safest option is to keep the reverse proxy in the DMZ while leaving the application and database servers in private subnets. That approach limits direct Internet access to one hardened entry point and protects the backend systems from unnecessary exposure. It also supports traffic filtering between tiers, so only the exact application flows needed for business use are allowed. Why others are wrong: Option A places the database where it is easier to attack, which is the opposite of good segmentation. Option C exposes the application server directly to the Internet and bypasses the protection of the proxy tier. Option D removes all meaningful isolation, making lateral movement and accidental exposure much easier.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.