Comp Tia Security Cheat Sheet
Comp Tia Security Cheat Sheet
This CompTIA Security+ Cheat Sheet is a brief roadmap in your preparation for this crucial
\ exam. It gives you a bird’s-eye view of key concepts and abbreviations in Security+. Owing
to Security+’s overlap with Network+, CCNA, and other networking-related certifications, this
cheat sheet excludes material on networking, which we encourage you to review separately.
Download this CompTIA Security+ Cheat Sheet here. When you’re ready, let’s dive in.
You’ll need to answer at most 90 questions in this 90-minute examination and complete a
survey after it ends. The passing score is 750 on a scale of 100–900.
The latest CompTIA Security+ exam code is SY0-601. The associated exam is available
from November 2020 to sometime in 2023–2024. New topics include supply chain
management and the Internet of Things (IoT).
This cheat sheet arranges concepts according to the subtopics in our Total Seminars
Security+ course, and some topics span several Security+ domains. Hence, we’ve provided
you a key to finding items according to Security+ domain:
Type these tags into the search bar to find key points related to a specific domain.
Risk Management
The following topics pertain to real-life applications of cyber security. When you review the
abbreviations, think: “Do I comprehend the ideas encapsulated by them?”
What do terms like “red team” and “blue team” mean in penetration testing?
\ The primary colors red, blue, and yellow refer to attackers, defenders, and builders of a
system respectively. The secondary colors are combinations of these roles. For example,
purple team members have dual attack/defense roles. The white team supervises the hack.
Cryptography
The following concepts are about obfuscating data from attackers and restoring them once
they reach the intended destination.
block size •
number of rounds•
#AD Asymmetric cipher Examples:
• Diffie-Hellman key exchange
• RSA
• Elliptic-curve cryptography
#AD Hashing One-way, deterministic process of transforming
a string of characters into another
#AD Salting Characters appended to a string (e.g.,
password) before hashing
#AD Steganography Hide data inside other data
#AD Quantum Exploit quantum mechanics
#AD Post-quantum Secure against cryptanalysis by quantum
computer
#AD Lightweight cryptography Small footprint, low computational complexity
#AD Homomorphic encryption Makes performing operations on encrypted
data possible
#AD CA Certificate authority
#practical
#AD CRL Certificate revocation list
#practical
#AD Stapling Checks regularly for certificate invalidity
#practical
#AD Pinning Associates certificate against known copy
#practical
#AD Trust model Direct •
#practical Third-party •
Hierarchical •
\ Distributed •
#AD Key escrow Third party safeguarding private keys
#practical
#AD Certificate chaining Top-down CA trust model
#practical
#AD Digital signature Public key sender verified to own
#practical corresponding private key
#practical P7B √ certificate
√ chain certificates
✕ private key
#practical P12 √ certificate
√ chain certificates
√ private key
#practical PKI Public Key Infrastructure
#practical PKCS Public Key Cryptography Standards
#ATV #AD Brute-force attack Trying character combinations
Example: MS-CHAP-v2
#practical Sandboxing Limiting access privileges of an application to
minimize its impact on the rest of the system
#AD Identity federation Delegate authentication to trusted third party
#practical
Examples:
• Raspberry Pi
• Field-programmable gate array (FPGA)
• Arduino
#AD Specialized system Combination of mechanical and digital
interfaces for specific purposes
Examples:
• Medicine
• Aviation
• Smart meters
#AD Internet of Things (IoT) Network of physical devices
#AD SCADA Supervisory control and data acquisition
#AD ICS Industrial control system
Physical Security
The best security measures are real-world limitations imposed on digital access. Here are a
few concepts worth reviewing:
\
Domain Concept Elaboration
#AD Air gap Physical isolation of secure computer network
from unsecured networks
#AD Protected cable Wired communications system with sufficient
distribution (Protected physical protection to carry unencrypted classified
Distribution System) information without leakage
#AD Screened subnet Five components:
(demilitarized zone) • External network
• External router
• Perimeter network
• Internal router
• Internal network
#AD Hot and cold aisles Draw in cool air to equipment, and draw out hot air
from equipment
#AD Two-person Continuous monitoring by at least two authorized
integrity/control individuals, each capable of detecting incorrect or
unauthorized security procedures
#AD Secure data destruction • Burning
• Shredding
• Pulping
• Pulverizing
• Degaussing
• Third-party solutions
#AD Monitoring sensors • Motion detection
• Noise detection
• Proximity reader
• Moisture detection
• Cards
• Temperature
Testing Infrastructure
This section is about social engineering and penetration testing. Manipulating perception
leads to much damage because humans are the weakest link in cyber security.
• Hybrid warfare
• Social media
#ATV Watering hole attack Infect a trusted website
#ATV Spam Mass mailing of unsolicited messages
Conclusion
This CompTIA Security+ Cheat Sheet is a checklist covering the examination syllabus, and
we hope it gives you a bird’s-eye view of non-networking key topics to remember.
Remember that we offer a complete course to passing the Security+ exam and practice
exams to test your abilities. No matter how you prepare for it, we wish you success.