easymulti selectObjective-mapped

A company is building a public web app with three tiers. Internet users should reach only the web tier, and the app tier should never be reachable from the internet. Which two network design choices support this goal? Select two.

Question 1easymulti select
Full question →

A company is building a public web app with three tiers. Internet users should reach only the web tier, and the app tier should never be reachable from the internet. Which two network design choices support this goal? Select two.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Place the web server in a DMZ or public-facing zone.

A DMZ is the standard place for internet-facing services because it creates a controlled boundary between public traffic and internal systems. It lets the web tier accept external requests without exposing deeper resources.

B

Distractor review

Allow inbound traffic from the internet directly to the application servers.

Direct internet access to the application servers defeats the purpose of a tiered design. It exposes the middle tier unnecessarily and makes it harder to control attacks.

C

Best answer

Restrict the application tier so only the web tier can initiate connections to it.

Limiting app-tier access to the web tier enforces the intended trust boundary. This is a classic segmentation rule for multi-tier applications and reduces the number of systems that can talk to the application layer.

D

Distractor review

Put the database on the guest Wi-Fi VLAN.

Guest wireless is untrusted and unsuitable for sensitive back-end systems. Placing a database there would be a severe architecture error rather than a security control.

E

Distractor review

Use the same flat network for all three tiers.

A flat network eliminates separation and makes lateral movement easier. It is the opposite of a secure zone-based design for public applications.

Common exam trap

Common exam trap: an active trunk can still block the VLAN you need

A trunk being up does not prove every VLAN is crossing it. Check allowed VLAN lists, native VLAN mismatch, VLAN existence and access-port assignment.

Technical deep dive

How to think about this question

VLAN questions usually combine access-port and trunking clues. The key is to identify whether the issue is local to one switchport, caused by the trunk, or caused by the VLAN not existing where it needs to exist.

KKey Concepts to Remember

  • Access ports place end devices into a single VLAN.
  • Trunk ports carry multiple VLANs between switches.
  • Allowed VLAN lists decide which VLANs can cross a trunk.
  • Native VLAN mismatch can create confusing symptoms.

TExam Day Tips

  • Use show vlan brief to verify access VLANs.
  • Use show interfaces trunk to verify trunk state and allowed VLANs.
  • Do not treat every same-VLAN issue as a routing problem.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Access ports place end devices into a single VLAN.

What is the correct answer to this question?

The correct answer is: Place the web server in a DMZ or public-facing zone. — The correct design places the web tier in a DMZ and limits access to the application tier so only the web tier can initiate connections. That arrangement matches a standard three-tier security model: public users reach only the front-end, while internal layers remain hidden behind controlled boundaries. Segmentation reduces exposure and makes policy enforcement much clearer. Why others are wrong: Letting the internet talk to the app servers or using one flat network removes the protection that zoning is supposed to provide. The database should also remain in a restricted internal zone, not on guest wireless. The best pair preserves trust boundaries between tiers and keeps public access at the edge.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.