Security+ SY0-701
Cheat Sheet Overview
Keep this page light, fast, and reliable. Focus on the four sections below and cycle through them every study session.
- PBQs when fresh, flag tricky MCQs, revisit with spare time.
- Daily routine: 15 questions per domain + 1 scenario run-through.
- Use spaced repetition—scan this layout quickly instead of reading long paragraphs.
Exam Window
90 Minutes
Budget ~1 minute per question and reserve 10 for PBQs
Passing Score
750 / 900
Target 83%+ on practice sets to stay ahead of curve
Study Index
Section 01
Exam Overview
Baseline stats + daily ritual so you always know what to do next.
Exam Window
90 Minutes
Budget ~1 minute per question and reserve 10 for PBQs
Passing Score
750 / 900
Target 83%+ on practice sets to stay ahead of curve
Question Mix
PBQ + MCQ
Expect 3-5 PBQs plus scenario-driven MCQs
Domain Weights
5 Pillars
Ops & IR (28%) + Threats (22%) carry the exam
Simple Daily Loop
- 1. Warm-up: 5 quick recall questions while reviewing acronyms.
- 2. Timed block: 15 mixed questions focusing on a single domain.
- 3. Review: Note weak topics, schedule deeper dive tomorrow.
- 4. Scenario: Walk through one PBQ or tabletop log review.
Section 02
Domain Game Plan
Every domain summarized with tactics and a single insight.
12% Weight
Domain 1 · General Security Concepts
Core principles, frameworks, and control families that anchor every decision.
- Map CIA, AAA, and control categories (preventive, detective, corrective) to scenarios.
- Understand governance terms like due diligence, data classification, risk appetite.
- Tie frameworks (NIST CSF, ISO 27001, CIS) to stakeholder requests and gap analyses.
Insight: Questions love phrasing like "best next step"—link the control objective to the action.
22% Weight
Domain 2 · Threats, Vulnerabilities & Mitigations
Adversary TTPs, malware, and intel handling from alert to containment.
- Tell the story: recon → weaponize → deliver → execute (kill chain mentality).
- Differentiate malware purpose (worm vs trojan vs fileless) and delivery method.
- Prioritize vulnerability reports using CVSS, exploitability, and business impact.
Insight: Expect log snippets, packet captures, and threat actor profiles to analyze.
18% Weight
Domain 3 · Architecture & Design
Secure network patterns, zero trust, cloud responsibilities, and hardening baselines.
- Sketch DMZs, microsegmentation, NAC, and zero trust flows until second nature.
- Compare on-prem vs cloud vs hybrid controls and who owns which responsibility.
- Secure emerging tech: OT, IoT, virtualization, containers, and edge compute.
Insight: Diagram questions appear often—annotate every component during practice.
28% Weight
Domain 4 · Operations & Incident Response
Monitoring, playbooks, automation, and forensic handling—the largest domain.
- Memorize IR lifecycle (Preparation → Lessons Learned) plus order of volatility.
- Decide when to contain vs eradicate vs recover in scenario prompts.
- Understand SOAR, EDR, script automation, and evidence handling requirements.
Insight: Weighted heavily—daily reps here deliver the fastest score gains.
20% Weight
Domain 5 · Governance, Risk & Compliance
BIA outputs, testing methods, legal requirements, and program maturity.
- Translate BIA findings into RTO, RPO, MTTR, and continuity strategies.
- Know testing types (tabletop, walkthrough, parallel, full interruption).
- Map privacy and regulatory requirements (PII, PCI-DSS, HIPAA, GDPR) to controls.
Insight: Look for keywords like "evidence", "attestation", or "stakeholder" in stems.
Section 03
Quick Reference Cards
Short bullet lists you can read in under a minute.
Risk Math & Metrics
Quantitative questions lean on these simple formulas.
- Risk = Threat × Vulnerability × Impact
- SLE = Asset Value × Exposure Factor
- ALE = SLE × ARO
- ARO represents expected frequency per year
Identity & Access Stack
Layer factors, federate identities, enforce least privilege.
- MFA factors: know, have, are, do, where
- SSO protocols: SAML (XML), OIDC (JSON), Kerberos (tickets)
- Account policies: lockout threshold, password history, time-of-day
- Auth models: RBAC, ABAC, MAC, DAC
Network & Platform Defense
Layer 2-7 protections keep adversaries boxed in.
- Segment with VLANs, SDN microsegments, air gaps for OT
- Inline stack: NGFW, IPS, SWG, CASB, WAF
- NAC posture checks (agent/agentless) with 802.1X enforcement
- Preferred secure protocols: HTTPS, SFTP, SSH, LDAPS, IMAPS
Cloud & Virtualization
Shared responsibility and automation underpin resilience.
- Service models: IaaS, PaaS, SaaS, FaaS—know who secures what
- CASB delivers visibility, policy enforcement, and SaaS DLP
- Container security: image signing, runtime profiles, orchestrator RBAC
- Object storage controls: versioning, immutability, lifecycle policies
Crypto & PKI Essentials
Symmetric for speed, asymmetric for trust—mix wisely.
- AES (symmetric) vs RSA/ECC (asymmetric) roles
- Cipher modes: CBC (legacy), GCM/CCM (authenticated), ECB (avoid)
- Hashing: SHA-256/3, HMAC = integrity + authenticity
- PKI chain: Root → Intermediate → Issued cert; validate via CRL/OCSP
Incident Response Micro-Playbook
Order of operations matters when adrenaline spikes.
- Preparation → Identification → Containment → Eradication → Recovery → Lessons
- Order of volatility: CPU/cache → memory → disk → logs → backups
- Containment options: isolate host, disable account, geo-fence, block IOC
- Chain of custody: hash evidence before/after transport, log handlers
Section 04
Memory + Acronyms
Say these out loud—speed matters as much as accuracy.
Mnemonic Wall
Mnemonic
CIA Triad
- C Confidentiality: encryption, access control, need-to-know
- I Integrity: hashing, digital signatures, change control
- A Availability: redundancy, fault tolerance, DR/BCP
Mnemonic
AAA Framework
- AuthN Authentication verifies identity (passwords, certs, biometrics)
- AuthZ Authorization enforces least privilege via policies
- Acct Accounting logs activity for audits and forensics
Mnemonic
STRIDE Threats
- S Spoofing → strong authentication, signed requests
- T Tampering → integrity checks, code signing, immutability
- R Repudiation → logging, non-repudiation controls
- I Information disclosure → classification, DLP, encryption
- D Denial of service → scaling, rate limits, scrubbing
- E Elevation of privilege → timely patching, least privilege
Mnemonic
OSI Story
- 7 Application – user interfaces, APIs, proxies
- 6 Presentation – TLS, SSL, data formatting
- 5 Session – NetBIOS, RPC, dialogs
- 4 Transport – TCP/UDP, segmentation, ports
- 3 Network – IP, routing, ACLs
- 2 Data Link – MAC, switching, ARP
- 1 Physical – cabling, RF, power
Mnemonic
DREAD Risk Model
- D Damage potential – blast radius if exploited
- R Reproducibility – how easily repeated
- E Exploitability – skill/tool requirement
- A Affected users – population hit
- D Discoverability – chance an attacker finds it
Acronym Board
Governance & Risk
4 termsAnnualized Loss Expectancy
Annualized Rate of Occurrence
Mean Time To Repair
Mean Time Between Failures
Identity & Access
4 termsMulti-Factor Authentication
Single Sign-On
Role-Based Access Control
Attribute-Based Access Control
Network & Platform
4 termsNetwork Access Control
Software-Defined Networking
Cloud Access Security Broker
Web Application Firewall
Threat Intel & Ops
4 termsIndicator of Compromise
Tactics, Techniques, Procedures
Endpoint Detection & Response
Security Orchestration, Automation & Response
Final Lap
Simulate exam day often
Keep the structure above visible beside your practice engine, narrate your choices, and tighten the weakest section each evening.