SY0-701 Exam Cheat Sheet 2026: Every Key Fact to Pass CompTIA Security+ on Your First Attempt

SY0-701 cheat sheet for 2026 - every key fact you need for exam day in one place. Domain weights, critical ports and protocols, must-know acronyms, attack-to-CIA mappings, incident response phases, compliance frameworks, Windows Event IDs, PBQ strategies, and a proven exam day routine.
SY0-701 cheat sheet 2026 - CompTIA Security+ quick reference for exam day

How to use this cheat sheet: This is your last-week and exam-morning quick reference. It does not replace deep study — it consolidates the most-tested facts from all five SY0-701 domains into scannable tables you can review in 20 minutes. Print it or bookmark it. Use it after completing your full preparation and again the morning of your exam.

Section 1: Core Exam Facts — Memorize These

DetailAnswer
Exam codeSY0-701
QuestionsUp to 90 (multiple-choice + performance-based)
Time90 minutes
Passing score750 out of 900
Exam cost$425 USD (Pearson VUE)
Certification validity3 years
Renewal50 CEUs + $150 fee, or pass current exam
DoD complianceDoD 8140 IAT Level II
Recommended experienceNetwork+ + 2 years IT/security experience
Previous version retiredSY0-601 retired July 31, 2024

For a complete breakdown of exam details, see our CompTIA Security+ SY0-701 exam guide.

Section 2: Domain Weights — Where Your Score Comes From

Study time must mirror exam weight. Domain 4 is worth more than twice Domain 1.

DomainWeightApprox. QuestionsStudy Priority
1. General Security Concepts12%~113rd
2. Threats, Vulnerabilities & Mitigations22%~202nd
3. Security Architecture18%~164th
4. Security Operations28%~251st
5. Security Program Management & Oversight20%~185th

Domains 4 and 2 together represent 50% of the exam. If you have limited review time left, spend it there.

For the full objective-by-objective breakdown see our SY0-701 exam objectives and domains guide.

Section 3: CIA Triad — Attack Mappings (Frequently Tested)

The exam regularly asks which element of the CIA triad a specific attack or scenario affects.

Attack / ScenarioCIA ImpactWhy
Ransomware encrypts filesAvailabilityFiles inaccessible until decryption
DDoS attack on web serverAvailabilityService unavailable to legitimate users
Man-in-the-middle intercepts dataConfidentialityUnauthorized party reads private data
Phishing steals credentialsConfidentialityAttacker gains unauthorized access
Data tampering / SQL injection modifies recordsIntegrityData accuracy compromised
Unauthorized database modificationIntegrityRecords no longer trustworthy
Disclosure of medical recordsConfidentialityPrivate data exposed
Backup deletion before disasterAvailabilityRecovery impossible

Section 4: Security Control Types and Categories

The exam tests these through scenarios. Know both the type (what it does) and category (how it is implemented).

Control types:

TypeWhat It DoesExample
PreventiveStops an incident before it happensFirewall, access control, encryption
DetectiveIdentifies an incident after it occursIDS, audit logs, CCTV
CorrectiveFixes the damage after an incidentPatch management, backups, incident response
DeterrentDiscourages attackersWarning banners, security guards, fencing
CompensatingAlternative control when primary is unavailableTemporary manual review replacing broken automated system
DirectiveInstructs people how to behaveSecurity policies, acceptable use policies

Control categories:

CategoryDescriptionExample
TechnicalSoftware/hardware-basedFirewalls, antivirus, encryption
Managerial / AdministrativePolicy and process-basedSecurity policies, risk assessments, training
OperationalPeople and process-basedBackground checks, security awareness training
PhysicalPhysical environment protectionLocks, fencing, badge readers, CCTV

Section 5: Cryptography Quick Reference

TypeKey StructureSpeedUse CaseExamples
SymmetricSame key for encrypt/decryptFastBulk data encryptionAES, DES, 3DES, RC4
AsymmetricPublic key (encrypt) + Private key (decrypt)SlowKey exchange, digital signaturesRSA, ECC, Diffie-Hellman
HashingOne-way, no keyVery fastIntegrity verification, password storageMD5, SHA-1, SHA-256, SHA-3
Digital signatureAsymmetric + hashingSlowAuthenticity + non-repudiationRSA + SHA-256

Key exam facts:

  • MD5 and SHA-1 are broken — insecure for security purposes. SHA-256 or SHA-3 are current standards.
  • RSA key length: 2048-bit minimum recommended; 4096-bit for high security.
  • ECC provides equivalent security to RSA with much smaller key sizes — preferred for mobile/IoT.
  • Diffie-Hellman is a key exchange algorithm, not an encryption algorithm — it establishes a shared secret over insecure channels.
  • TLS 1.3 is current. TLS 1.0, 1.1, and SSL are deprecated and insecure.

Section 6: Critical Ports and Protocols

Ports appear in network security scenarios and firewall rule questions.

Protocol / ServicePort(s)Secure?Notes
HTTP80NoUnencrypted web traffic
HTTPS443YesTLS-encrypted web traffic
FTP20 (data), 21 (control)NoUnencrypted file transfer
SFTP22YesSSH-based secure file transfer
FTPS990YesFTP over TLS
SSH22YesEncrypted remote admin
Telnet23NoUnencrypted remote admin — deprecated
SMTP25NoEmail sending (unencrypted)
SMTPS / SMTP+TLS465 / 587YesEncrypted email sending
POP3110NoEmail retrieval
POP3S995YesEncrypted email retrieval
IMAP143NoEmail retrieval
IMAPS993YesEncrypted email retrieval
DNS53No (standard)Domain name resolution
DNSSEC53YesDNS with integrity verification
DHCP67 (server), 68 (client)NoIP address assignment
LDAP389NoDirectory services
LDAPS636YesLDAP over TLS
Kerberos88YesAuthentication protocol
RDP3389VariesRemote desktop — high-value attack target
SMB445VariesWindows file sharing
SNMP v1/v2161NoNetwork management — use v3
SNMP v3161YesSecure network management
Syslog514NoSystem log forwarding
NTP123NoTime synchronization
IPsec / IKE500YesVPN tunnel establishment
RADIUS1812 (auth), 1813 (acct)YesAAA for network access
TACACS+49YesCisco AAA
BGP179No standardInternet routing protocol

High-value exam tip: When a scenario describes an insecure protocol being used, the correct answer usually involves replacing it with its secure counterpart — Telnet → SSH, HTTP → HTTPS, FTP → SFTP, LDAP → LDAPS, SNMP v1/v2 → SNMP v3.

Section 7: Malware Types — Quick Reference

Malware TypeWhat It DoesKey Identifier in Scenario
RansomwareEncrypts files, demands payment“Files encrypted,” “ransom note appeared”
TrojanDisguises as legitimate software“Downloaded from unofficial source,” “unexpected behavior after install”
RootkitHides presence on system, provides persistent backdoor“Antivirus cannot find infection,” “reinstall required to remove”
KeyloggerCaptures keystrokes“Credentials stolen without phishing,” “passwords leaked”
SpywareCollects user data without consent“Browser redirected,” “unauthorized data exfiltration”
AdwareDisplays unwanted ads“Browser pop-ups,” “homepage changed”
WormSelf-replicates across networks without user action“Spread rapidly across network,” “no user interaction required”
Fileless malwareOperates entirely in memory, no disk footprint“No malicious files found,” “lives in legitimate process memory”
BotnetNetwork of infected machines controlled remotely“DDoS attack source,” “C2 communication detected”
Logic bombExecutes malicious code when trigger condition is met“Activated on specific date,” “triggered by employee termination”

Section 8: Social Engineering Attacks

AttackMethodKey Identifier
PhishingFraudulent email impersonating trusted entityMass email, generic greeting, link to fake site
Spear phishingTargeted phishing using personal detailsPersonalized content, correct name/company
WhalingExecutive-targeted spear phishingC-suite target, high-value business request
VishingPhone call impersonation“Tech support called,” “IRS agent threatened”
SmishingSMS-based phishingText message with malicious link
PretextingFabricated scenario to gain trust“IT department called needing password,” false identity claimed
BaitingPhysical media with malicious payload left where target will find it“USB drive found in parking lot”
Quid pro quoOffers benefit in exchange for information“Free gift offered in exchange for credentials”
Tailgating / PiggybackingFollowing authorized person through secured door“Followed employee into data center”
Watering holeCompromising websites frequently visited by targets“Industry website served malware to specific visitors”

Section 9: Incident Response Phases — In Exact Order

The exam tests sequence. Know what happens in each phase, not just the names.

PhaseKey Actions
1. PreparationBuild IR plan, assemble team, acquire tools, train staff, establish communication plan
2. IdentificationDetect incident, determine scope and severity, classify incident type
3. ContainmentShort-term: isolate affected systems. Long-term: maintain services while limiting spread
4. EradicationRemove malware, close attack vector, patch vulnerabilities, clean affected systems
5. RecoveryRestore systems from clean backups, verify integrity, monitor for recurrence
6. Lessons LearnedPost-incident review, document findings, update IR plan, improve defenses

Common exam trap: Containment and Eradication are different phases. You contain first (limit damage while threat is still present), then eradicate (remove the threat after containment). Candidates who reverse these fail scenario questions.

Section 10: Windows Event IDs — High-Value for PBQs

These Event IDs appear in SIEM log analysis questions. Know what each means.

Event IDMeaningWhy It Matters
4624Successful logonBaseline — use to identify unauthorized successful access
4625Failed logonMultiple failures = brute force attempt
4648Logon using explicit credentialsPass-the-hash or credential stuffing indicator
4672Special privileges assigned to new logonPrivilege escalation indicator
4688New process createdSuspicious process execution
4698Scheduled task createdPersistence mechanism — malware often uses this
4720New user account createdUnauthorized account creation
4732User added to privileged groupUnauthorized privilege escalation
7045New service installedPersistence mechanism
4663Object access attemptFile/folder access monitoring

Section 11: Network Architecture — Quick Concepts

ConceptDefinitionExam Application
DMZNetwork segment between internet and internal network hosting public-facing services“Where to place web servers accessible from internet”
VLANLogical network separation on same physical infrastructure“Segment traffic without physical separation”
MicrosegmentationGranular policy enforcement between individual workloads“Zero trust network design,” “east-west traffic control”
Air gapPhysical isolation from all external networks“Highest security isolation,” industrial control systems
NACEnforces security policy before granting network access“Ensure endpoint compliance before allowing connection”
Jump server / Bastion hostHardened intermediary for accessing secure internal systems“How to securely administer internal servers from external”
Proxy serverIntermediary between clients and internet resources“Content filtering,” “anonymization,” “caching”
Load balancerDistributes traffic across multiple servers“High availability,” “prevent single point of failure”
HoneypotDecoy system designed to attract and detect attackers“Detect intrusion attempts,” “gather attacker intelligence”

Section 12: Compliance Frameworks — Quick Reference

FrameworkApplies ToKey Requirement
GDPREU personal data (global scope)Consent required, breach notification within 72 hours, right to erasure
HIPAAUS healthcare (PHI)Protect patient health information, Business Associate Agreements required
PCI-DSSPayment card data (global)Secure cardholder data, annual assessment, 12 core requirements
CMMCUS DoD contractors handling CUITiered maturity model, third-party assessment for Level 2+
SOXPublicly traded US companiesFinancial data integrity, IT controls for financial systems
NIST CSFVoluntary US framework (widely adopted)Identify, Protect, Detect, Respond, Recover
ISO 27001International information security managementISMS implementation, risk treatment, continuous improvement

Exam tip: Know which framework applies to which industry/data type — scenarios will describe an organization and ask which framework they must comply with. GDPR applies globally whenever EU personal data is involved, regardless of where the company is located.

Section 13: Risk Management Quick Reference

TermDefinition
RiskLikelihood × Impact of a threat exploiting a vulnerability
ThreatPotential cause of an unwanted incident
VulnerabilityWeakness that can be exploited
Risk appetiteAmount of risk an organization is willing to accept
Risk toleranceAcceptable variation around the risk appetite
Inherent riskRisk before any controls are applied
Residual riskRisk remaining after controls are applied
Risk acceptanceAcknowledge risk and do nothing — cost of control exceeds cost of risk
Risk avoidanceEliminate the activity that creates the risk
Risk transferShift risk to another party (insurance, outsourcing)
Risk mitigationImplement controls to reduce likelihood or impact
ALEAnnual Loss Expectancy = ARO × SLE
AROAnnualized Rate of Occurrence — how often a threat occurs per year
SLESingle Loss Expectancy — cost of one occurrence

Section 14: Authentication and IAM Quick Reference

TermDefinitionExample
Something you knowKnowledge factorPassword, PIN, security question
Something you havePossession factorSmart card, hardware token, phone (TOTP)
Something you areInherence factorFingerprint, retina, facial recognition
Somewhere you areLocation factorGPS location, IP address geolocation
MFATwo or more different factor types requiredPassword + phone TOTP
SSOSingle set of credentials for multiple systemsLogin once, access all applications
FederationIdentity trust between separate organizationsUse company credentials to access partner system
RBACAccess based on job roleAccountant gets finance system access
MACAccess based on classification labelsSecret-cleared user accesses secret documents
DACResource owner controls who has accessFile owner grants permissions to specific users
Least privilegeGrant only the access needed for the job functionDeveloper has no access to production database
PAMSpecial controls for administrator/privileged accountsJust-in-time access, session recording

Section 15: PBQ Scenarios — What They Test and How to Handle Them

PBQ TypeWhat Is TestedStrategy
Firewall rule configurationPort knowledge, least privilege, traffic directionIdentify required service → find its port → allow inbound/outbound only as needed
Log file analysisThreat detection, Event ID recognitionLook for repeated failures (4625), unusual new processes (4688), privilege changes (4672)
Incident response orderingIR phase sequencePreparation → Identification → Containment → Eradication → Recovery → Lessons Learned
Network diagram — identify vulnerabilityArchitecture conceptsLook for missing segmentation, direct internet exposure of sensitive systems
Wireless security configurationProtocol knowledgeRecommend WPA3, 802.1X for enterprise, disable WPS, use strong passphrase
Access control scenarioIAM conceptsApply least privilege, identify correct access model for described environment
Vulnerability prioritizationCVSS, asset value, exploitabilityInternet-facing + unpatched + exploitable = highest priority regardless of CVSS alone
Drag-and-drop orderingProcess/phase knowledgeIR phases, OSI layers, forensic evidence collection order of volatility

PBQ exam strategy: When a PBQ appears, read the full scenario before attempting any action. Many PBQs contain the answer embedded in the scenario details. Candidates who rush miss it. Flag PBQs on first pass, answer all MCQs first, then return with focused time.

Use CertEmpire’s SY0-701 exam questions to practice scenario-based question formats that build the applied reasoning PBQs demand. For a broader set of practice questions see our free SY0-701 practice test.

Section 16: Acronyms You Must Know Cold

AcronymFull FormDomain
CIAConfidentiality, Integrity, AvailabilityAll
AAAAuthentication, Authorization, AccountingD1, D4
PKIPublic Key InfrastructureD1
TLSTransport Layer SecurityD1, D3
MFAMulti-Factor AuthenticationD1, D4
SSOSingle Sign-OnD1, D4
SIEMSecurity Information and Event ManagementD4
SOARSecurity Orchestration, Automation, and ResponseD4
EDREndpoint Detection and ResponseD4
XDRExtended Detection and ResponseD4
DLPData Loss PreventionD4
IAMIdentity and Access ManagementD4
PAMPrivileged Access ManagementD4
RBACRole-Based Access ControlD4
MACMandatory Access ControlD4
NACNetwork Access ControlD3
DMZDemilitarized ZoneD3
CSPMCloud Security Posture ManagementD3
CASBCloud Access Security BrokerD3
IDS / IPSIntrusion Detection / Prevention SystemD3, D4
VPNVirtual Private NetworkD3
GDPRGeneral Data Protection RegulationD5
HIPAAHealth Insurance Portability and Accountability ActD5
PCI-DSSPayment Card Industry Data Security StandardD5
CMMCCybersecurity Maturity Model CertificationD5
NISTNational Institute of Standards and TechnologyD5
BIABusiness Impact AnalysisD5
RTORecovery Time ObjectiveD5
RPORecovery Point ObjectiveD5
ALEAnnual Loss ExpectancyD5
CVECommon Vulnerabilities and ExposuresD2
CVSSCommon Vulnerability Scoring SystemD2
IoCIndicator of CompromiseD2

Section 17: Exam Day Playbook

Night Before

  • Stop studying by 8 PM — cramming the night before reduces performance, it does not improve it.
  • 20-minute light review of this cheat sheet only — ports, acronyms, IR phases, CIA mappings.
  • Prepare your ID (two forms required), Pearson VUE confirmation, and any required test center items.
  • Get at least 7 hours of sleep. Memory consolidation happens during sleep.

Morning of the Exam

  • Eat a proper meal. Avoid high-sugar foods that cause energy crashes mid-exam.
  • Test center: arrive 30 minutes early. Online (OnVUE): begin check-in process 15 minutes early.
  • Run OnVUE system check the day before if testing online — do not discover technical issues on exam morning.

During the Exam — 4-Pass Strategy

Pass 1 (minutes 1–35): Answer every multiple-choice question you can solve confidently in 30–45 seconds. Flag anything requiring more thought. Target: answer 50–60 questions in this pass.

Pass 2 (minutes 35–55): Return to flagged MCQs. Eliminate obviously wrong answers first. Choose between remaining options. If genuinely uncertain, apply CompTIA’s tendency: the more conservative, policy-driven, least-privilege answer is usually correct.

Pass 3 (minutes 55–80): Tackle PBQs. Read the full scenario before attempting anything. Work methodically. Do not leave any PBQ completely blank — partial credit applies to some formats.

Pass 4 (minutes 80–90): Final sweep. Verify every question has an answer. Review any questions you marked for reconsideration only if you have a specific reason — changing answers based on anxiety reduces your score.

Key Exam Mindset Tips

  • Watch for qualifier words: most, best, first, least — they change the correct answer.
  • “Which should you do first?” questions test process knowledge — always think about what phase or step comes before others.
  • When two answers both seem correct, the one that is more comprehensive, more proactive, or better aligned to policy is usually right.
  • Never leave a question unanswered — there is no penalty for wrong answers on Security+.

Section 18: Order of Volatility — Forensics (High PBQ Value)

When collecting digital evidence, always start with the most volatile (most easily lost) and work toward the least volatile.

  1. CPU registers and cache (lost when power is cut)
  2. RAM and running processes
  3. Swap file / pagefile / virtual memory
  4. Network connections and routing tables
  5. Running processes (if not already captured)
  6. Disk storage (hard drives, SSDs)
  7. Remote logging data
  8. Physical media (optical discs, printouts)

Rule of thumb: If it disappears when you pull the power plug, collect it first.

Section 19: Quick Domain Recap — Last-Night Review

Domain 1 (12%) — General Security Concepts Control types and categories | CIA triad attack mappings | Symmetric vs asymmetric vs hashing | PKI and certificate management | Authentication factors and MFA | Zero trust — verify explicitly, least privilege, assume breach

Domain 2 (22%) — Threats, Vulnerabilities & Mitigations Malware types and behaviors | Social engineering attacks | Network attack mechanisms | Application vulnerabilities (SQLi, XSS, CSRF, buffer overflow) | Supply chain attacks | CVSS scoring and vulnerability prioritization | Indicators of compromise

Domain 3 (18%) — Security Architecture DMZ, VLAN, microsegmentation use cases | Zero trust implementation | Cloud shared responsibility model | Secure vs insecure protocols | Redundancy — RAID types, RTO, RPO | Secure SDLC

Domain 4 (28%) — Security Operations IR phases in exact order | Windows Event IDs — 4625, 4672, 4688 | SIEM and SOAR concepts | Digital forensics — order of volatility, chain of custody | Vulnerability management — CVSS in context | IAM — RBAC, MAC, DAC, least privilege, PAM | EDR and DLP

Domain 5 (20%) — Security Program Management GDPR, HIPAA, PCI-DSS, CMMC, SOX — who they apply to | Risk treatment options — accept, avoid, transfer, mitigate | ALE = ARO × SLE | RTO vs RPO vs MTTR | Hot/warm/cold site | Security governance hierarchy — policy → standard → guideline → procedure

Frequently Asked Questions

How should I use this cheat sheet? 

Use it in two ways: as a weekly review reference during your final two weeks of preparation, and as a 20-minute morning-of-exam review. It is not a replacement for deep study — it is a consolidation tool that ensures you have the most-tested facts ready at recall speed on exam day.

What is the most important section of this cheat sheet? 

Sections 9 (Incident Response Phases), 6 (Ports and Protocols), 10 (Windows Event IDs), and 12 (Compliance Frameworks) are the highest-value memorization targets. Section 17 (Exam Day Playbook) is the most important to read in full.

What score do I need to pass SY0-701? 

750 on a scale of 100 to 900. This is a scaled score — the exact percentage of questions needed to reach 750 varies by exam session based on question difficulty.

What is the SY0-701 exam cost in 2026?

$425 USD for the exam voucher through Pearson VUE. For the full cost breakdown including preparation materials and renewal, see our Security+ exam cost guide.

How do I register for SY0-701? 

Through Pearson VUE at pearsonvue.com/comptia — test center or online (OnVUE). See our SY0-701 registration guide for step-by-step instructions.

What happens if I fail? 

Retake after 14 days. Each retake costs $425. Identify which domains scored lowest and treat those as your primary focus areas. Do not repeat the same preparation approach without changing something.

What should I study after passing Security+? 

The most common next step for SOC and analyst careers is CompTIA CySA+. For senior roles the path leads to CISSP. See our guide on what to do after Security+ for a full breakdown.

Final Thought

Everything you need to know for SY0-701 is in the official exam objectives from CompTIA.org. Everything you need to quickly recall on exam day is in this cheat sheet. The gap between knowing the material and performing well under time pressure is closed by practice — specifically timed, scenario-based practice questions reviewed with full explanations.

Use CertEmpire’s SY0-701 exam questions to build that practice foundation, start with the free practice test to benchmark where you are, and walk into your exam with the confidence that comes from genuine preparation.

For your complete SY0-701 preparation system, see our SY0-701 preparation guide and week-by-week study plan.

For official exam objectives and registration visit CompTIA.org. For Security+ career and salary data see our Security+ salary and jobs guide.

Leave a Replay

Table of Contents

Have You Tried Our Exam Dumps?

Cert Empire is the market leader in providing highly accurate valid exam dumps for certification exams. If you are an aspirant and want to pass your certification exam on the first attempt, CertEmpire is you way to go. 

Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE