Network Diagram PBQs: CompTIA SecurityX (CAS-005)
easyQuestion 1 of 3
You are designing a basic defense-in-depth network for a mid-size enterprise. The architecture uses three standard security zones. The Perimeter zone faces the internet and hosts all externally accessible services. The Trusted zone contains internal business systems used by employees. The Management zone is restricted to IT administrators and security infrastructure. A next-generation firewall and a core router are already deployed. Place the remaining devices into the correct zones based on their function and security requirements.
Network Topology
Perimeter Zone
Internet-facing services — reverse proxies, VPN endpoints, email gateways
Trusted Zone
Internal business applications, employee endpoints, databases
Management Zone
IT administration — monitoring, configuration management, secure access
Drop devices here
Available Devices
Drag devices into the correct network zone above
Progress
0 of 4 devices placedDrag devices into the correct network zones
0 of 3 marked complete

