CompTIA Security+ Cheat Sheet
CompTIA Security+ Cheat Sheet
This CompTIA Security+ Cheat Sheet is a brief roadmap in your preparation for this crucial
\ exam. It gives you a bird’s-eye view of key concepts and abbreviations in Security+. Owing
to Security+’s overlap with Network+, CCNA, and other networking-related certifications, this
cheat sheet excludes material on networking, which we encourage you to review separately.
Download this CompTIA Security+ Cheat Sheet here. When you’re ready, let’s dive in.
You’ll need to answer at most 90 questions in this 90-minute examination and complete a
survey after it ends. The passing score is 750 on a scale of 100–900.
The latest CompTIA Security+ exam code is SY0-601. The associated exam is available
from November 2020 to sometime in 2023–2024. New topics include supply chain
management and the Internet of Things (IoT).
Security+ Domains (SY0-601)
The following illustration shows the assessment criteria and the weighting in this
examination:
This cheat sheet arranges concepts according to the subtopics in our Total Seminars
Security+ course, and some topics span several Security+ domains. Hence, we’ve provided
you a key to finding items according to Security+ domain:
Type these tags into the search bar to find key points related to a specific domain.
Risk Management
The following topics pertain to real-life applications of cyber security. When you review the
abbreviations, think: “Do I comprehend the ideas encapsulated by them?”
\ The primary colors red, blue, and yellow refer to attackers, defenders, and builders of a
system respectively. The secondary colors are combinations of these roles. For example,
purple team members have dual attack/defense roles. The white team supervises the hack.
Cryptography
The following concepts are about obfuscating data from attackers and restoring them once
they reach the intended destination.
Example: MS-CHAP-v2
#practical Sandboxing Limiting access privileges of an application to
minimize its impact on the rest of the system
#AD Identity federation Delegate authentication to trusted third party
#practical
Examples:
• Medicine
• Aviation
• Smart meters
#AD Internet of Things (IoT) Network of physical devices
#AD SCADA Supervisory control and data acquisition
#AD ICS Industrial control system
Physical Security
The best security measures are real-world limitations imposed on digital access. Here are a
few concepts worth reviewing:
\
Domain Concept Elaboration
#AD Air gap Physical isolation of secure computer network
from unsecured networks
#AD Protected cable Wired communications system with sufficient
distribution (Protected physical protection to carry unencrypted classified
Distribution System) information without leakage
#AD Screened subnet Five components:
(demilitarized zone) • External network
• External router
• Perimeter network
• Internal router
• Internal network
#AD Hot and cold aisles Draw in cool air to equipment, and draw out hot air
from equipment
#AD Two-person Continuous monitoring by at least two authorized
integrity/control individuals, each capable of detecting incorrect or
unauthorized security procedures
#AD Secure data destruction • Burning
• Shredding
• Pulping
• Pulverizing
• Degaussing
• Third-party solutions
#AD Monitoring sensors • Motion detection
• Noise detection
• Proximity reader
• Moisture detection
• Cards
• Temperature
Testing Infrastructure
This section is about social engineering and penetration testing. Manipulating perception
leads to much damage because humans are the weakest link in cyber security.
Remember that we offer a complete course to passing the Security+ exam and practice
exams to test your abilities. No matter how you prepare for it, we wish you success.