Skip to content

Security+ (SY0-701) Study Path

What This Study Path Provides

This guide maps every CompTIA Security+ SY0-701 exam domain directly to Nexus SecOps content so you can prepare for the certification using hands-on, defense-oriented material. For each domain you will find:

  • Chapter mappings with specific section references
  • Key topics aligned to exam objectives
  • 10 original practice questions per domain (50 total) with detailed explanations
  • Lab, MicroSim, and scenario cross-references for hands-on reinforcement
  • An 8-week study calendar designed for working professionals

How to use this guide

Work through one domain at a time. Read the mapped chapters, complete the linked labs and scenarios, then test yourself with the practice questions. Use the expandable answers to review explanations and identify gaps.


Exam Overview

Detail Value
Exam Code SY0-701
Number of Questions Up to 90
Duration 90 minutes
Passing Score 750 / 900
Question Types Multiple choice + performance-based
Cost ~$392 USD
Validity 3 years (CE credits or retake)
Prerequisites None required (Network+ recommended)
DoD 8570 IAT Level II baseline
Domain Weight
1. General Security Concepts 12%
2. Threats, Vulnerabilities, and Mitigations 22%
3. Security Architecture 18%
4. Security Operations 28%
5. Security Program Management and Oversight 20%

Domain 1: General Security Concepts (12%)

Mapped Chapters

Chapter Title Key Sections
Ch01 Introduction to SOC & AI SOC structure, analyst tiers, MITRE ATT&CK fundamentals
Ch02 Telemetry & Log Sources Security data types, log integrity, audit trails
Ch03 Data Modeling & Normalization Data classification, schema enforcement, information lifecycle
Ch13 Security Governance, Privacy & Risk Policy hierarchy, governance frameworks, privacy principles
Ch15 Resilience & Tabletop Exercises Business continuity, resilience planning, lessons learned

Key Topics

  1. Security controls -- preventive, detective, corrective, deterrent, compensating, and physical controls mapped across administrative, technical, and operational categories.
  2. CIA triad and AAA -- confidentiality, integrity, availability, authentication, authorization, and accounting applied to SOC telemetry and access management.
  3. Zero Trust principles -- "never trust, always verify" model, implicit deny, micro-segmentation basics (see also Ch39).
  4. Threat actors and motivations -- nation-state, hacktivist, organized crime, insider threat, script kiddie, and their TTPs mapped to MITRE ATT&CK.
  5. Gap analysis and security assessments -- control evaluation, risk identification, and maturity measurement.

Practice Questions -- Domain 1

Question 1: Which type of security control is designed to discourage a threat actor from attempting an attack in the first place?

A) Detective B) Corrective C) Deterrent D) Compensating

Answer

Correct Answer: C) Deterrent

Explanation: Deterrent controls aim to discourage attacks before they happen. Examples include security cameras (visible), warning banners, security lighting, and acceptable use policies. Detective controls identify attacks in progress, corrective controls fix damage after an attack, and compensating controls provide alternative protection when primary controls are impractical.

Reference: Chapter 1 -- Security Control Types


Question 2: An organization requires all employees to use smart cards and PINs to access the server room. Which security concept does this implement?

A) Single-factor authentication B) Multi-factor authentication C) Role-based access control D) Discretionary access control

Answer

Correct Answer: B) Multi-factor authentication

Explanation: Smart card (something you have) combined with PIN (something you know) constitutes two different authentication factors. MFA requires at least two factors from different categories: something you know, something you have, something you are, or somewhere you are. Using two passwords would be multi-step but not multi-factor since both are "something you know."

Reference: Chapter 13 -- Authentication and Access Controls


Question 3: Which principle states that users should only be given the minimum permissions necessary to perform their job functions?

A) Separation of duties B) Need to know C) Least privilege D) Defense in depth

Answer

Correct Answer: C) Least privilege

Explanation: The principle of least privilege restricts user access rights to the bare minimum needed for their role. Need to know is related but specifically limits access to information. Separation of duties ensures no single person can complete a critical process alone. Defense in depth uses multiple layers of controls rather than limiting individual permissions.

Reference: Chapter 13 -- Governance and Access Principles


Question 4: A SOC analyst notices that firewall logs, endpoint detection alerts, and authentication events are all stored in different formats. Which process would standardize these into a common schema?

A) Data masking B) Log normalization C) Data deduplication D) Event correlation

Answer

Correct Answer: B) Log normalization

Explanation: Log normalization converts disparate log formats into a common schema (such as ECS, CIM, or CEF) so analysts and detection rules can process events consistently. Data masking obscures sensitive fields, deduplication removes repeated records, and correlation links related events into incidents -- but none of those standardize the format itself.

Reference: Chapter 3 -- Data Modeling and Normalization


Question 5: Which element of the CIA triad is MOST directly compromised when an attacker modifies database records without authorization?

A) Confidentiality B) Integrity C) Availability D) Non-repudiation

Answer

Correct Answer: B) Integrity

Explanation: Integrity ensures that data has not been altered by unauthorized parties. Unauthorized modification of database records is a direct integrity violation. Confidentiality addresses unauthorized disclosure, availability addresses denial of service, and non-repudiation (not part of CIA) proves a party performed an action.

Reference: Chapter 1 -- Security Fundamentals


Question 6: A security team conducts a tabletop exercise simulating a ransomware incident. What type of control is this exercise considered?

A) Technical detective B) Administrative preventive C) Physical deterrent D) Operational corrective

Answer

Correct Answer: B) Administrative preventive

Explanation: Tabletop exercises are administrative (policy/procedure-based) and preventive because they prepare teams to handle incidents more effectively before they occur. They identify gaps in response plans and improve readiness. While they may reveal detective or corrective control weaknesses, the exercise itself is an administrative preventive measure.

Reference: Chapter 15 -- Resilience and Tabletop Exercises


Question 7: In a Zero Trust architecture, which statement BEST describes the default security posture?

A) Internal users are trusted; external users are verified B) All traffic is denied unless explicitly allowed regardless of location C) Trust is established by network zone membership D) VPN users inherit full network access

Answer

Correct Answer: B) All traffic is denied unless explicitly allowed regardless of location

Explanation: Zero Trust eliminates implicit trust based on network location. Every access request -- whether from inside or outside the corporate perimeter -- must be authenticated, authorized, and continuously validated. Options A, C, and D all describe perimeter-based trust models that Zero Trust explicitly rejects.

Reference: Chapter 39 -- Zero Trust Implementation


Question 8: A company classifies data as Public, Internal, Confidential, and Restricted. A marketing brochure available on the website would receive which classification?

A) Restricted B) Confidential C) Internal D) Public

Answer

Correct Answer: D) Public

Explanation: Data classification labels indicate the sensitivity and required handling. A marketing brochure intended for external distribution on the company website is Public data -- no harm results from its disclosure. Restricted data (e.g., PII, trade secrets) requires the highest protection, Confidential is sensitive but less critical, and Internal is for employee-only material.

Reference: Chapter 3 -- Data Classification and Lifecycle


Question 9: Which MITRE ATT&CK component describes the specific method a threat actor uses to achieve a tactic?

A) Tactic B) Technique C) Procedure D) Campaign

Answer

Correct Answer: B) Technique

Explanation: In MITRE ATT&CK, tactics represent the adversary's goal (the "why"), techniques describe how the adversary achieves that goal (the "how"), and procedures are specific implementations of techniques observed in the wild. Campaigns describe coordinated sets of intrusion activity. The hierarchy is: Tactic > Technique > Sub-technique > Procedure.

Reference: Chapter 1 -- MITRE ATT&CK Framework


Question 10: An organization discovers that a former contractor still has VPN access two months after their contract ended. Which security process failed?

A) Onboarding B) Account provisioning C) Offboarding D) Access recertification

Answer

Correct Answer: C) Offboarding

Explanation: Offboarding is the process of revoking all access when an employee or contractor leaves the organization. This includes disabling accounts, revoking VPN credentials, retrieving equipment, and removing from distribution lists. While access recertification reviews could also catch this, the root failure is the offboarding process that should have immediately revoked access upon contract termination.

Reference: Chapter 13 -- Identity Lifecycle and Governance


Domain 2: Threats, Vulnerabilities, and Mitigations (22%)

Mapped Chapters

Chapter Title Key Sections
Ch22 Threat Actor Encyclopedia APT groups, MITRE ATT&CK mapping, TTPs, detection opportunities
Ch23 Ransomware Deep Dive Kill chain analysis, double extortion, detection engineering
Ch24 Supply Chain Attacks SolarWinds, XZ Utils, MOVEit, SLSA/SBOM frameworks
Ch25 Social Engineering Phishing, vishing, pretexting, awareness programs
Ch26 Insider Threats Behavioral indicators, UEBA, investigation frameworks
Ch29 Vulnerability Management CVSS, EPSS, risk-based prioritization, patch management
Ch53 Zero-Day Response CVE lifecycle, CVSS v4, responsible disclosure, virtual patching

Key Topics

  1. Threat actor types -- nation-state APTs, organized crime, hacktivists, insider threats, and their motivations (financial, espionage, disruption, ideology).
  2. Attack vectors -- phishing, watering hole, supply chain compromise, removable media, wireless, and direct access attacks.
  3. Vulnerability types -- software flaws (buffer overflow, injection, XSS), misconfigurations, default credentials, zero-day, and third-party library risks.
  4. Malware categories -- ransomware, trojans, rootkits, fileless malware, RATs, worms, logic bombs, and cryptominers.
  5. Mitigation techniques -- patching, network segmentation, input validation, application allow-listing, endpoint hardening, and security awareness training.

Practice Questions -- Domain 2

Question 1: A user receives an email that appears to come from the CEO, urgently requesting a wire transfer to a new vendor. The email address is CEO@company-secure.com instead of CEO@company.com. What type of attack is this?

A) Spear phishing B) Whaling C) Business email compromise (BEC) D) Vishing

Answer

Correct Answer: C) Business email compromise (BEC)

Explanation: BEC attacks impersonate executives or trusted parties to trick employees into transferring funds or disclosing sensitive data. While this is also a form of spear phishing (targeted) and whaling (targeting high-value individuals), the use of a look-alike domain to impersonate the CEO for financial fraud is the hallmark of BEC. Vishing uses voice calls rather than email.

Reference: Chapter 25 -- Social Engineering and BEC Attacks


Question 2: An attacker compromises a software vendor's build server and injects malicious code into a legitimate software update. Thousands of customers install the tainted update. What type of attack is this?

A) Watering hole attack B) Supply chain attack C) Drive-by download D) Typosquatting

Answer

Correct Answer: B) Supply chain attack

Explanation: Supply chain attacks compromise a trusted vendor, supplier, or third-party component to reach the vendor's downstream customers. The SolarWinds Orion compromise (2020) is the canonical example: attackers injected malicious code into the build pipeline, and the trojanized update was distributed to approximately 18,000 organizations. Watering hole attacks compromise websites that targets visit, not vendor build pipelines.

Reference: Chapter 24 -- Supply Chain Attacks


Question 3: Which vulnerability scoring system uses factors like Attack Vector, Attack Complexity, Privileges Required, and User Interaction to calculate a severity score from 0.0 to 10.0?

A) EPSS B) CVSS C) CWE D) CVE

Answer

Correct Answer: B) CVSS

Explanation: The Common Vulnerability Scoring System (CVSS) evaluates vulnerabilities on a 0.0-10.0 scale using Base, Temporal, and Environmental metric groups. Base metrics include Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope, and CIA impact. EPSS predicts exploitation probability, CWE categorizes weakness types, and CVE provides unique identifiers for vulnerabilities.

Reference: Chapter 29 -- Vulnerability Management and CVSS


Question 4: An organization discovers that a disgruntled employee has been exfiltrating customer data to a personal cloud storage account for three months. Which threat category does this represent?

A) Advanced persistent threat B) Insider threat C) Hacktivist D) Organized crime

Answer

Correct Answer: B) Insider threat

Explanation: Insider threats originate from individuals who have legitimate access to organizational resources -- employees, contractors, or business partners. This scenario describes a malicious insider motivated by grievance. Key indicators include unusual data access patterns, use of personal storage services, and after-hours activity. UEBA (User and Entity Behavior Analytics) is a primary detection mechanism for this threat type.

Reference: Chapter 26 -- Insider Threats


Question 5: Ransomware operators exfiltrate 50 GB of data before encrypting the victim's systems, then threaten to publish the data unless payment is received. What is this technique called?

A) Cryptojacking B) Double extortion C) Credential stuffing D) Data diddling

Answer

Correct Answer: B) Double extortion

Explanation: Double extortion combines traditional ransomware encryption with data theft and the threat of public exposure. Victims face two pressures: pay to decrypt their data AND pay to prevent publication of stolen data. This technique was pioneered by the Maze ransomware group and has become standard practice. Some groups have escalated to triple extortion, adding DDoS threats or contacting customers directly.

Reference: Chapter 23 -- Ransomware Deep Dive


Question 6: A security scanner reports a critical vulnerability (CVSS 9.8) in a library used by an internal application. EPSS shows a 2% probability of exploitation. The application is only accessible from the internal network. How should the team prioritize this?

A) Patch immediately -- CVSS 9.8 is critical regardless of context B) Deprioritize completely -- 2% EPSS means it will not be exploited C) Apply risk-based prioritization considering CVSS, EPSS, asset exposure, and business impact D) Accept the risk since the application is internal

Answer

Correct Answer: C) Apply risk-based prioritization considering CVSS, EPSS, asset exposure, and business impact

Explanation: Risk-based vulnerability management considers multiple factors: CVSS severity, EPSS exploitation likelihood, asset criticality, network exposure, and compensating controls. While the CVSS score is high, the low EPSS and internal-only exposure reduce the effective risk. Neither CVSS alone nor EPSS alone tells the complete story. The team should still plan remediation but may not need to treat it as an emergency.

Reference: Chapter 29 -- Risk-Based Vulnerability Prioritization


Question 7: Which type of malware operates entirely in memory, leaves no files on disk, and often abuses legitimate system tools like PowerShell?

A) Rootkit B) Worm C) Fileless malware D) Trojan

Answer

Correct Answer: C) Fileless malware

Explanation: Fileless malware resides exclusively in memory and leverages legitimate system tools (Living off the Land Binaries, or LOLBins) such as PowerShell, WMI, and mshta.exe. Because nothing is written to disk, traditional signature-based antivirus cannot detect it. Detection requires behavioral analysis, script block logging, AMSI integration, and memory-based endpoint detection.

Reference: Chapter 22 -- Threat Actor TTPs and Fileless Techniques


Question 8: A newly discovered vulnerability has no vendor patch available. The security team implements a WAF rule to block exploit attempts while waiting for a fix. What is this mitigation called?

A) Hot fix B) Virtual patching C) Compensating control D) Both B and C

Answer

Correct Answer: D) Both B and C

Explanation: Virtual patching uses WAF rules, IPS signatures, or other network-based controls to block exploitation of a known vulnerability without modifying the vulnerable application. It is also a compensating control because it provides alternative protection when the primary control (vendor patch) is unavailable. Virtual patching is a critical strategy for zero-day response while vendors develop official fixes.

Reference: Chapter 53 -- Zero-Day Response and Virtual Patching


Question 9: An attacker sends a link to https://paypa1.com (with a numeral '1' instead of the letter 'l') in a phishing email. What technique is being used?

A) URL redirection B) Typosquatting C) DNS poisoning D) Pharming

Answer

Correct Answer: B) Typosquatting

Explanation: Typosquatting (also called URL hijacking) registers domain names that are visually similar to legitimate domains, exploiting common typing mistakes or character substitutions. Using "paypa1.com" (numeral 1) instead of "paypal.com" (letter l) is a classic homoglyph attack. URL redirection sends users from a legitimate URL to a malicious one, DNS poisoning corrupts DNS responses, and pharming redirects traffic at the DNS level.

Reference: Chapter 25 -- Social Engineering Techniques


Question 10: Which framework provides a standardized way to document the software components included in an application, helping organizations identify vulnerable dependencies?

A) STIX B) SBOM C) SOAR D) SIEM

Answer

Correct Answer: B) SBOM

Explanation: A Software Bill of Materials (SBOM) is a formal, machine-readable inventory of all components, libraries, and dependencies in a software product. SBOMs enable rapid identification of affected systems when a vulnerability is discovered in a component (e.g., Log4Shell). STIX is a threat intelligence format, SOAR is a security orchestration platform, and SIEM is a log aggregation and correlation system.

Reference: Chapter 24 -- Supply Chain Attacks and SBOM


Domain 3: Security Architecture (18%)

Mapped Chapters

Chapter Title Key Sections
Ch31 Network Security Architecture Zero Trust, NGFW, IDS/IPS, micro-segmentation, SASE, DNS security
Ch32 Applied Cryptography Symmetric/asymmetric algorithms, PKI, TLS, certificate management
Ch33 Identity & Access Security Active Directory, PAM, MFA, SSO, federation, RBAC
Ch34 Mobile & IoT Security MDM/UEM, IoT architecture, OT convergence
Ch39 Zero Trust Implementation NIST SP 800-207, CISA maturity model, deployment roadmap

Key Topics

  1. Network architecture models -- perimeter-based vs. Zero Trust, DMZ design, network segmentation, micro-segmentation, and software-defined networking.
  2. Cryptographic concepts -- symmetric (AES, ChaCha20) vs. asymmetric (RSA, ECC), hashing (SHA-256), digital signatures, PKI, and certificate lifecycle.
  3. Identity and access management -- authentication methods, authorization models (RBAC, ABAC, MAC, DAC), federation (SAML, OAuth, OIDC), and privileged access management.
  4. Secure infrastructure design -- cloud security (IaaS/PaaS/SaaS shared responsibility), containerization, virtualization, serverless security, and infrastructure as code.
  5. Resilience and redundancy -- high availability, load balancing, RAID, backups (3-2-1 rule), disaster recovery, and geographic redundancy.

Practice Questions -- Domain 3

Question 1: A company is deploying a web application in AWS. The CISO wants to ensure the organization understands its security responsibilities. Under the shared responsibility model for IaaS, who is responsible for patching the operating system?

A) The cloud service provider (AWS) B) The customer C) Both equally D) Neither -- it is automated

Answer

Correct Answer: B) The customer

Explanation: In the IaaS shared responsibility model, the cloud provider secures the infrastructure (physical data centers, hypervisors, network fabric), while the customer is responsible for everything deployed on that infrastructure: operating systems, applications, data, identity management, and network configurations. In PaaS, the provider takes on OS patching; in SaaS, the provider manages nearly everything except data and user access.

Reference: Chapter 31 -- Cloud Security Architecture


Question 2: Which cryptographic algorithm is an asymmetric encryption standard commonly used for key exchange and digital signatures?

A) AES-256 B) SHA-512 C) RSA D) ChaCha20

Answer

Correct Answer: C) RSA

Explanation: RSA is an asymmetric (public-key) algorithm used for encryption, key exchange, and digital signatures. AES-256 and ChaCha20 are symmetric algorithms (same key for encryption and decryption), and SHA-512 is a hashing algorithm (one-way function, not encryption). Asymmetric algorithms use a key pair -- public key for encryption and private key for decryption.

Reference: Chapter 32 -- Applied Cryptography


Question 3: An organization wants to ensure that network traffic between branch offices is encrypted and authenticated. Which protocol provides both encryption and integrity verification for site-to-site VPN tunnels?

A) PPTP B) IPSec C) TFTP D) Telnet

Answer

Correct Answer: B) IPSec

Explanation: IPSec (Internet Protocol Security) provides confidentiality (encryption via ESP), integrity (HMAC), and authentication (IKE key exchange) for IP traffic. It supports both transport mode (payload only) and tunnel mode (entire packet) and is the standard for site-to-site VPNs. PPTP is deprecated and insecure, TFTP is an unencrypted file transfer protocol, and Telnet transmits data in cleartext.

Reference: Chapter 31 -- Network Security Architecture


Question 4: A security architect is designing an identity system that grants access based on user attributes such as department, clearance level, time of day, and device posture rather than static role assignments. Which access control model is being implemented?

A) Role-Based Access Control (RBAC) B) Mandatory Access Control (MAC) C) Attribute-Based Access Control (ABAC) D) Discretionary Access Control (DAC)

Answer

Correct Answer: C) Attribute-Based Access Control (ABAC)

Explanation: ABAC evaluates multiple attributes (user, resource, environment, action) to make dynamic access decisions. Unlike RBAC, which assigns permissions based on fixed roles, ABAC can incorporate contextual factors like time, location, and device health. This makes ABAC more granular and flexible, though more complex to implement. MAC uses classification labels and clearance levels, and DAC lets resource owners set permissions.

Reference: Chapter 33 -- Identity and Access Security


Question 5: Which network security appliance inspects traffic at all OSI layers, can perform deep packet inspection, and integrates threat intelligence for application-aware filtering?

A) Traditional stateful firewall B) Next-Generation Firewall (NGFW) C) Network switch D) Load balancer

Answer

Correct Answer: B) Next-Generation Firewall (NGFW)

Explanation: NGFWs combine traditional firewall capabilities (stateful packet inspection) with advanced features: deep packet inspection, application identification and control, integrated IPS, threat intelligence feeds, TLS inspection, and user identity awareness. Traditional stateful firewalls only inspect headers and track connection state. Switches operate at Layer 2, and load balancers distribute traffic without deep security inspection.

Reference: Chapter 31 -- Network Security Architecture and NGFW


Question 6: An organization issues digital certificates to employees for email signing. The certificate for a terminated employee must be invalidated before its expiration date. What mechanism is used?

A) Certificate Signing Request (CSR) B) Certificate Revocation List (CRL) C) Certificate Transparency Log D) Key escrow

Answer

Correct Answer: B) Certificate Revocation List (CRL)

Explanation: A CRL is a list published by the Certificate Authority containing serial numbers of revoked certificates. Applications check the CRL (or use OCSP -- Online Certificate Status Protocol -- for real-time queries) before trusting a certificate. CSR is used to request a new certificate, Certificate Transparency logs record certificate issuance for auditing, and key escrow stores backup copies of encryption keys.

Reference: Chapter 32 -- PKI and Certificate Management


Question 7: A company deploys MDM software on all employee mobile devices. Which security capability does MDM provide that a standard VPN cannot?

A) Encrypted communication channels B) Remote wipe of lost or stolen devices C) Authentication before network access D) IP address masking

Answer

Correct Answer: B) Remote wipe of lost or stolen devices

Explanation: Mobile Device Management (MDM) provides device-level control including remote wipe, application management, policy enforcement, geofencing, and containerization of corporate data. VPNs only encrypt network traffic and authenticate users for network access -- they cannot manage the device itself, enforce application policies, or wipe data remotely.

Reference: Chapter 34 -- Mobile and IoT Security


Question 8: Which backup strategy maintains three copies of data, stored on two different media types, with one copy stored offsite?

A) RAID 5 B) 3-2-1 backup rule C) Differential backup D) Incremental backup

Answer

Correct Answer: B) 3-2-1 backup rule

Explanation: The 3-2-1 rule is a data protection best practice: maintain 3 copies of data (primary + 2 backups), on 2 different media types (e.g., disk + tape or disk + cloud), with 1 copy stored offsite (geographically separate). RAID provides disk redundancy but is not a backup strategy, and differential/incremental describe backup scheduling methods rather than the overall strategy.

Reference: Chapter 15 -- Resilience and Business Continuity


Question 9: An IoT manufacturer ships devices with default credentials that users rarely change. Which type of vulnerability does this represent?

A) Zero-day vulnerability B) Misconfiguration C) Race condition D) Buffer overflow

Answer

Correct Answer: B) Misconfiguration

Explanation: Default credentials are a misconfiguration vulnerability -- the device is not properly secured out of the box, and users fail to change default settings. This is one of the most exploited vulnerability types in IoT devices, enabling botnets like Mirai. Zero-day refers to unknown/unpatched flaws, race conditions involve timing issues in concurrent processes, and buffer overflows are memory corruption bugs.

Reference: Chapter 34 -- IoT Security Challenges


Question 10: Which Zero Trust principle requires that every access request be verified regardless of whether it originates from inside or outside the corporate network?

A) Implicit trust B) Verify explicitly C) Castle-and-moat security D) Network perimeter defense

Answer

Correct Answer: B) Verify explicitly

Explanation: "Verify explicitly" is a core Zero Trust principle (alongside "use least privilege access" and "assume breach"). It mandates that every access request must be authenticated and authorized based on all available data points -- identity, device health, location, data classification -- regardless of network location. Options A, C, and D describe the traditional perimeter security model that Zero Trust replaces.

Reference: Chapter 39 -- Zero Trust Implementation


Domain 4: Security Operations (28%)

Mapped Chapters

Chapter Title Key Sections
Ch04 SIEM & Data Lake Correlation Correlation rules, search queries, analytics
Ch05 Detection Engineering at Scale Signature/behavior rules, MITRE ATT&CK coverage
Ch06 Triage, Investigation & Enrichment Alert workflows, timeline analysis, pivot techniques
Ch07 Threat Intelligence & Context Intel feeds, CTI quality, proactive hunting
Ch08 SOAR & Automation Playbooks Security playbooks, human approval gates, automation ROI
Ch09 Incident Response Lifecycle NIST framework, containment, eradication, recovery
Ch27 Digital Forensics Disk/memory/network/cloud forensics, evidence preservation
Ch28 Advanced Incident Response Nation-state, ransomware, data breach handling
Ch35 DevSecOps Pipeline CI/CD hardening, secrets management, automated gates
Ch38 Advanced Threat Hunting PEAK/TaHiTI methodologies, behavioral analytics

Key Topics

  1. SIEM operations -- log ingestion, correlation rules, alert tuning, search queries (KQL, SPL), and dashboard design for security monitoring.
  2. Incident response process -- NIST SP 800-61 phases (Preparation, Detection & Analysis, Containment, Eradication & Recovery, Post-Incident Activity), escalation procedures, and documentation.
  3. Digital forensics -- evidence collection, chain of custody, disk imaging, memory analysis, network packet capture, and legal/regulatory requirements.
  4. Vulnerability scanning and assessment -- authenticated vs. unauthenticated scans, credentialed scanning, false positive management, and remediation tracking.
  5. Security automation and orchestration -- SOAR platforms, playbook design, API integrations, and automated response workflows with human-in-the-loop gates.

Practice Questions -- Domain 4

Question 1: During an incident response, the team has confirmed a compromised server. According to NIST SP 800-61, what is the NEXT phase after Detection and Analysis?

A) Post-Incident Activity B) Preparation C) Containment, Eradication, and Recovery D) Lessons Learned

Answer

Correct Answer: C) Containment, Eradication, and Recovery

Explanation: The NIST SP 800-61 Incident Response Lifecycle follows four phases: (1) Preparation, (2) Detection and Analysis, (3) Containment, Eradication, and Recovery, (4) Post-Incident Activity (Lessons Learned). After confirming a compromise during Detection and Analysis, the team must contain the threat to prevent lateral movement, eradicate the attacker's presence, and recover affected systems.

Reference: Chapter 9 -- Incident Response Lifecycle


Question 2: A SOC analyst is investigating a suspicious process and needs to capture the contents of RAM on a running Windows system before shutting it down. What type of forensic acquisition is this?

A) Disk imaging B) Volatile data collection C) Network capture D) Log export

Answer

Correct Answer: B) Volatile data collection

Explanation: Volatile data exists only in RAM and is lost when the system is powered off. It includes running processes, network connections, loaded DLLs, registry hives in memory, and encryption keys. The order of volatility (RFC 3227) dictates that volatile data must be collected before non-volatile evidence. Tools like WinPMEM, FTK Imager, and Magnet RAM Capture are used for memory acquisition.

Reference: Chapter 27 -- Digital Forensics and Evidence Collection


Question 3: A SIEM correlation rule triggers when it detects five failed login attempts followed by a successful login from the same source IP within 10 minutes. What type of attack does this rule detect?

A) Password spraying B) Brute force authentication attack C) Credential stuffing D) Pass-the-hash

Answer

Correct Answer: B) Brute force authentication attack

Explanation: A brute force attack repeatedly tries passwords against a single account until one succeeds. The SIEM correlation pattern (multiple failures then success from the same IP against the same account) is the classic brute force signature. Password spraying tries one password across many accounts, credential stuffing uses breached credential pairs, and pass-the-hash uses stolen NTLM hashes rather than passwords.

Reference: Chapter 4 -- SIEM Correlation Rules


Question 4: After containing a ransomware incident, the IR team needs to determine the initial access vector. Forensic analysis reveals a malicious macro-enabled document was opened from a phishing email. Which MITRE ATT&CK tactic does this initial access represent?

A) Execution (TA0002) B) Initial Access (TA0001) C) Persistence (TA0003) D) Impact (TA0040)

Answer

Correct Answer: B) Initial Access (TA0001)

Explanation: Initial Access (TA0001) describes how an adversary first gains a foothold in the target environment. Phishing with a malicious attachment (T1566.001) is one of the most common Initial Access techniques. While the macro executing is part of the Execution tactic, the question asks specifically about the initial access vector -- the phishing email that delivered the malicious document.

Reference: Chapter 5 -- Detection Engineering and MITRE ATT&CK


Question 5: A security team wants to automate the enrichment of IP addresses found in SIEM alerts by checking them against threat intelligence feeds and WHOIS databases. Which technology platform would BEST support this workflow?

A) DLP B) SOAR C) NAC D) WAF

Answer

Correct Answer: B) SOAR

Explanation: Security Orchestration, Automation, and Response (SOAR) platforms orchestrate workflows across multiple security tools via API integrations. A SOAR playbook can automatically extract IOCs from SIEM alerts, query threat intelligence platforms, perform WHOIS lookups, and enrich the alert with contextual data -- all without manual analyst intervention. DLP prevents data loss, NAC controls network access, and WAFs protect web applications.

Reference: Chapter 8 -- SOAR and Automation Playbooks


Question 6: During a forensic investigation, an analyst creates a bit-for-bit copy of a suspect's hard drive. Before analysis begins, what must the analyst generate to verify the integrity of the forensic image?

A) Digital certificate B) Cryptographic hash (MD5/SHA-256) C) Access control list D) System restore point

Answer

Correct Answer: B) Cryptographic hash (MD5/SHA-256)

Explanation: A cryptographic hash of both the original drive and the forensic image verifies that the copy is an exact duplicate. If the hashes match, the image is a perfect copy. This hash is documented in the chain of custody and can be verified at any point to prove the evidence has not been tampered with. SHA-256 is preferred over MD5 for forensic work due to MD5's known collision vulnerabilities.

Reference: Chapter 27 -- Digital Forensics and Evidence Integrity


Question 7: A threat hunter forms the hypothesis: 'An adversary is using scheduled tasks for persistence on domain controllers.' They then query endpoint telemetry for schtasks.exe executions on DC hosts. Which threat hunting methodology does this follow?

A) Reactive hunting B) Hypothesis-driven hunting C) Machine-learning-based anomaly detection D) IOC sweeping

Answer

Correct Answer: B) Hypothesis-driven hunting

Explanation: Hypothesis-driven hunting starts with a theory about adversary behavior (based on threat intelligence, ATT&CK techniques, or risk assessment), then proactively searches for evidence supporting or refuting the hypothesis. This is distinct from reactive hunting (triggered by an alert), ML anomaly detection (automated statistical analysis), and IOC sweeping (searching for known indicators). The PEAK framework formalizes this approach.

Reference: Chapter 38 -- Advanced Threat Hunting Methodologies


Question 8: An alert fires indicating that a user account has been added to the Domain Admins group outside of the normal change management window. What should the SOC analyst do FIRST?

A) Remove the account from Domain Admins immediately B) Verify whether the change was authorized through the change management system C) Disable the user account D) Rebuild the domain controller

Answer

Correct Answer: B) Verify whether the change was authorized through the change management system

Explanation: Before taking any action, the analyst must determine if the change is legitimate. Checking the change management system, contacting the IT admin team, and reviewing approval records prevents disrupting authorized administrative actions. Jumping to containment (removing the account, disabling it) without verification can cause unnecessary business disruption. However, if the change is confirmed unauthorized, immediate containment is warranted.

Reference: Chapter 6 -- Triage, Investigation, and Enrichment


Question 9: A CI/CD pipeline includes a secrets scanning step that blocks builds containing hardcoded API keys or passwords. At which stage of the DevSecOps pipeline is this control applied?

A) Runtime protection B) Pre-commit / build-time C) Post-deployment monitoring D) Penetration testing

Answer

Correct Answer: B) Pre-commit / build-time

Explanation: Secrets scanning in the CI/CD pipeline is a "shift left" control that catches credential exposure before code reaches production. Build-time security gates can include SAST (Static Application Security Testing), dependency scanning, secrets detection, IaC policy checks, and container image scanning. Catching secrets before deployment prevents the need for costly credential rotation and reduces breach risk.

Reference: Chapter 35 -- DevSecOps Pipeline Security


Question 10: During a security incident, the IR team needs to preserve the order in which evidence is collected. Which forensic principle requires that the most volatile data (RAM, running processes) be collected before less volatile data (hard drive)?

A) Locard's exchange principle B) Order of volatility C) Best evidence rule D) Chain of custody

Answer

Correct Answer: B) Order of volatility

Explanation: The order of volatility (RFC 3227) dictates that evidence must be collected from most volatile to least volatile: (1) CPU registers/cache, (2) RAM, (3) network state, (4) running processes, (5) disk, (6) remote logging, (7) physical configuration, (8) archival media. Volatile data is lost when power is removed, so it must be captured first. Chain of custody tracks evidence handling, and Locard's principle relates to physical evidence exchange.

Reference: Chapter 27 -- Digital Forensics Methodology


Domain 5: Security Program Management and Oversight (20%)

Mapped Chapters

Chapter Title Key Sections
Ch12 Evaluation Metrics & KPIs SOC metrics, dashboard design, maturity measurement
Ch13 Security Governance, Privacy & Risk GDPR, HIPAA, PCI-DSS, AI governance, policy hierarchy
Ch14 Operating Model, Staffing & SLAs Team structures, SLA design, workload management
Ch15 Resilience & Tabletop Exercises Purple team programs, organizational learning
Ch40 Security Program Leadership Board communication, risk translation, budget justification

Key Topics

  1. Governance frameworks -- NIST CSF, ISO 27001, COBIT, and how organizations select and implement security frameworks based on industry, regulatory requirements, and risk appetite.
  2. Risk management -- risk identification, qualitative vs. quantitative analysis, risk treatment options (mitigate, transfer, accept, avoid), risk registers, and residual risk.
  3. Compliance and regulations -- GDPR, HIPAA, PCI-DSS, SOX, CCPA, FERPA, and their specific security requirements including notification timelines, penalties, and data handling obligations.
  4. Security awareness and training -- program design, phishing simulations, role-based training, metrics for effectiveness, and creating a security culture.
  5. Third-party risk management -- vendor assessments, SOC 2 reports, SLA requirements, right-to-audit clauses, and supply chain risk evaluation.

Practice Questions -- Domain 5

Question 1: An organization must comply with a regulation requiring notification of affected individuals within 72 hours of discovering a data breach involving personal data. Which regulation is this?

A) PCI-DSS B) HIPAA C) GDPR D) SOX

Answer

Correct Answer: C) GDPR

Explanation: The EU General Data Protection Regulation (GDPR) requires data controllers to notify the supervisory authority within 72 hours of becoming aware of a personal data breach, and to notify affected individuals "without undue delay" if the breach is likely to result in high risk. HIPAA requires notification within 60 days, PCI-DSS mandates breach notification per card brand rules, and SOX focuses on financial reporting controls rather than breach notification.

Reference: Chapter 13 -- Compliance Frameworks and GDPR


Question 2: A risk assessment identifies a threat with a likelihood of 'Medium' and an impact of 'High.' The organization decides to purchase cyber insurance to cover potential losses. Which risk treatment strategy is being applied?

A) Risk mitigation B) Risk acceptance C) Risk avoidance D) Risk transfer

Answer

Correct Answer: D) Risk transfer

Explanation: Risk transfer shifts the financial burden of a risk to a third party, typically through insurance or contractual agreements. Cyber insurance is the most common form of risk transfer. Mitigation reduces the likelihood or impact through controls, acceptance acknowledges the risk without additional action, and avoidance eliminates the risk by discontinuing the activity that creates it.

Reference: Chapter 13 -- Risk Management Strategies


Question 3: Which framework provides a common language for describing an organization's cybersecurity posture using five core functions: Identify, Protect, Detect, Respond, and Recover?

A) ISO 27001 B) NIST Cybersecurity Framework (CSF) C) COBIT D) CIS Controls

Answer

Correct Answer: B) NIST Cybersecurity Framework (CSF)

Explanation: The NIST CSF organizes cybersecurity activities into five core functions: Identify (asset management, risk assessment), Protect (access control, awareness), Detect (monitoring, anomalies), Respond (incident response, communication), and Recover (recovery planning, improvements). Note: NIST CSF 2.0 added a sixth function, Govern, in 2024. ISO 27001 uses controls in Annex A, COBIT focuses on IT governance, and CIS Controls provides a prioritized set of security actions.

Reference: Chapter 13 -- Governance Frameworks


Question 4: A SOC measures that its Mean Time to Detect (MTTD) decreased from 48 hours to 8 hours after deploying new detection rules. Which category of metric is MTTD?

A) Lagging indicator B) Key Performance Indicator (KPI) C) Key Risk Indicator (KRI) D) Service Level Objective (SLO)

Answer

Correct Answer: B) Key Performance Indicator (KPI)

Explanation: MTTD is a Key Performance Indicator that measures the effectiveness of the detection capability. KPIs track operational performance and progress toward goals. A KRI would measure risk exposure (e.g., number of unpatched critical vulnerabilities), an SLO defines a target threshold (e.g., "MTTD must be under 12 hours"), and a lagging indicator measures outcomes after the fact rather than driving improvement.

Reference: Chapter 12 -- Evaluation Metrics and KPIs


Question 5: Before onboarding a new cloud SaaS vendor that will process customer PII, which assessment should the security team request to evaluate the vendor's control environment?

A) Vulnerability scan results B) SOC 2 Type II audit report C) Penetration test summary D) Network architecture diagram

Answer

Correct Answer: B) SOC 2 Type II audit report

Explanation: SOC 2 Type II reports provide an independent auditor's assessment of a service organization's controls over a period of time (typically 6-12 months) against the Trust Service Criteria (security, availability, processing integrity, confidentiality, privacy). Type II is preferred over Type I because it tests control effectiveness over time, not just design at a point in time. Vulnerability scans and pen tests assess technical security but not the broader control environment.

Reference: Chapter 40 -- Third-Party Risk Management


Question 6: An organization's security policy states that all employees must complete security awareness training within 30 days of hire and annually thereafter. This policy is an example of which type of control?

A) Technical B) Administrative C) Physical D) Compensating

Answer

Correct Answer: B) Administrative

Explanation: Administrative controls (also called managerial controls) are policies, procedures, and guidelines that define how security is managed within an organization. Security awareness training requirements, acceptable use policies, and background check procedures are all administrative controls. Technical controls are implemented in hardware/software, physical controls protect tangible assets, and compensating controls substitute for primary controls.

Reference: Chapter 14 -- Operating Model and Security Policies


Question 7: A CISO presents the board with a risk register showing residual risk after implementing all planned controls. What does 'residual risk' represent?

A) The total risk before any controls are applied B) The risk that remains after controls have been implemented C) The risk transferred to an insurance provider D) The risk the organization has chosen to avoid

Answer

Correct Answer: B) The risk that remains after controls have been implemented

Explanation: Residual risk is the risk that persists after all selected security controls have been applied. It is impossible to eliminate all risk; the goal is to reduce residual risk to a level acceptable to the organization (risk appetite). Inherent risk is the total risk before controls, risk transfer shifts burden to a third party, and risk avoidance eliminates the activity creating the risk. The formula is: Residual Risk = Inherent Risk - Control Effectiveness.

Reference: Chapter 40 -- Security Program Leadership and Risk Communication


Question 8: An organization is subject to PCI-DSS and processes credit card transactions. Which of the following is a PCI-DSS requirement?

A) Notify breaches within 72 hours B) Encrypt cardholder data at rest and in transit C) Appoint a Data Protection Officer D) Conduct a privacy impact assessment annually

Answer

Correct Answer: B) Encrypt cardholder data at rest and in transit

Explanation: PCI-DSS Requirement 3 mandates protection of stored cardholder data (encryption at rest), and Requirement 4 requires encryption during transmission over open/public networks. The 72-hour notification and DPO appointment are GDPR requirements, and annual privacy impact assessments are not a PCI-DSS mandate (though risk assessments are required under Requirement 12).

Reference: Chapter 13 -- Compliance Frameworks and PCI-DSS


Question 9: During a post-incident review, the IR team identifies that the same type of phishing attack succeeded three times in six months despite existing email filters. What should the security program prioritize?

A) Replace the entire security team B) Enhanced security awareness training with phishing simulations targeting the identified gaps C) Block all external email D) Accept phishing as an unavoidable risk

Answer

Correct Answer: B) Enhanced security awareness training with phishing simulations targeting the identified gaps

Explanation: Recurring incidents of the same type indicate a gap in the security program. Targeted security awareness training with realistic phishing simulations addresses the human element while improving technical controls (email filters, URL sandboxing). Post-incident lessons learned should drive measurable improvements. Blocking all email or accepting the risk are extreme and impractical responses, and replacing staff does not address the systemic gap.

Reference: Chapter 15 -- Lessons Learned and Continuous Improvement


Question 10: Which document defines the specific security requirements, response times, and penalties between an organization and its managed security service provider (MSSP)?

A) Memorandum of Understanding (MOU) B) Service Level Agreement (SLA) C) Non-Disclosure Agreement (NDA) D) Business Impact Analysis (BIA)

Answer

Correct Answer: B) Service Level Agreement (SLA)

Explanation: An SLA is a binding contract that defines measurable service expectations: response times (e.g., critical alerts acknowledged within 15 minutes), uptime guarantees, escalation procedures, reporting requirements, and penalties for non-compliance. MOUs express mutual intent without legal enforcement, NDAs protect confidential information, and BIAs assess the impact of business disruptions on operations.

Reference: Chapter 14 -- SLA Design and Vendor Management


8-Week Study Calendar

Use this calendar to pace your preparation. Each week includes reading, labs, and practice questions. Adjust based on your experience level -- spend more time on weaker domains.

Week 1: Foundations (Domain 1)

Day Activity
Mon Read Ch01: Introduction to SOC & AI -- SOC structure, analyst tiers, MITRE ATT&CK
Tue Read Ch02: Telemetry & Logging -- log sources, normalization
Wed Read Ch03: Data Modeling -- schemas, data classification
Thu Read Ch13: Governance -- frameworks, CIA, AAA, access models
Fri Complete Lab 01: Synthetic Alert Triage
Sat Domain 1 practice questions (above) + Quiz Ch01
Sun Review weak areas, flashcard key terms

Week 2: Threats and Vulnerabilities (Domain 2, Part 1)

Day Activity
Mon Read Ch22: Threat Actor Encyclopedia
Tue Read Ch23: Ransomware Deep Dive
Wed Read Ch24: Supply Chain Attacks
Thu Read Ch25: Social Engineering
Fri Read Ch26: Insider Threats
Sat Complete Lab 07: Malware Triage + Lab 10: Threat Hunt
Sun Domain 2 practice questions (Q1-5)

Week 3: Threats and Vulnerabilities (Domain 2, Part 2) + Architecture Start

Day Activity
Mon Read Ch29: Vulnerability Management
Tue Read Ch53: Zero-Day Response
Wed Complete Lab 30: Vulnerability Triage
Thu Domain 2 practice questions (Q6-10) + review
Fri Read Ch31: Network Security Architecture
Sat Read Ch32: Applied Cryptography
Sun Review Domain 2, begin Domain 3 flashcards

Week 4: Security Architecture (Domain 3)

Day Activity
Mon Read Ch33: Identity & Access Security
Tue Read Ch34: Mobile & IoT Security
Wed Read Ch39: Zero Trust Implementation
Thu Complete Lab 06: AD Attack Paths + Lab 29: Zero Trust
Fri Complete Lab 08: Cloud Security Audit
Sat Domain 3 practice questions + Quiz Ch31
Sun Review Domains 1-3, identify weak areas

Week 5: Security Operations (Domain 4, Part 1)

Day Activity
Mon Read Ch04: SIEM & Correlation
Tue Read Ch05: Detection Engineering
Wed Read Ch06: Triage & Investigation
Thu Read Ch07: Threat Intelligence
Fri Complete Lab 01: Alert Triage + Lab 02: Detection Tuning
Sat Domain 4 practice questions (Q1-5)
Sun Review and flashcards

Week 6: Security Operations (Domain 4, Part 2)

Day Activity
Mon Read Ch08: SOAR & Automation
Tue Read Ch09: Incident Response Lifecycle
Wed Read Ch27: Digital Forensics
Thu Read Ch28: Advanced IR + Ch38: Threat Hunting
Fri Complete Lab 03: IR Simulation + Lab 12: DFIR Artifacts
Sat Domain 4 practice questions (Q6-10) + Lab 04: SOAR Safety
Sun Review Domain 4, cumulative review of Domains 1-4

Week 7: Security Program Management (Domain 5)

Day Activity
Mon Read Ch12: Metrics & KPIs
Tue Read Ch14: Operating Model & SLAs
Wed Read Ch15: Resilience & Tabletops
Thu Read Ch40: Security Program Leadership
Fri Complete Lab 09: Purple Team Exercise
Sat Domain 5 practice questions
Sun Full review of all five domains

Week 8: Review and Practice Exams

Day Activity
Mon Retake all 50 practice questions from this study path
Tue Complete the Nexus SecOps 100-Question Exam Simulator
Wed Review every missed question -- re-read the referenced chapter sections
Thu Focus study on your two weakest domains
Fri Take a timed practice exam (use exam conditions: 90 min, no notes)
Sat Light review -- flashcards, key terms, acronyms only
Sun REST -- exam day tomorrow

Study Tips for Security+ SY0-701

Performance-Based Questions (PBQs)

SY0-701 includes performance-based questions that require hands-on skills such as configuring firewalls, analyzing logs, or identifying vulnerabilities in a diagram. Nexus SecOps labs provide exactly this type of hands-on practice. Complete as many labs as possible before exam day.

Focus on the Largest Domains

Domain 4 (Security Operations) is worth 28% of the exam -- more than any other domain. If you are short on time, prioritize Domains 4 and 2 (together worth 50% of the exam).

Learn the 'Why,' Not Just the 'What'

The SY0-701 exam tests scenario-based reasoning, not rote memorization. For every control or technology, understand WHY it exists and WHEN you would choose it over alternatives. Nexus SecOps chapters are written with this approach.

Master Acronyms and Frameworks

Security+ is acronym-heavy. Create flashcards for: CIA, AAA, NIST CSF, NIST SP 800-61, GDPR, HIPAA, PCI-DSS, CVSS, EPSS, SIEM, SOAR, RBAC, ABAC, MAC, DAC, PKI, CRL, OCSP, IPSec, MFA, and SSO. Know what each stands for and its primary purpose.

Use the Elimination Method

For multiple-choice questions, eliminate obviously wrong answers first. Security+ often includes one clearly wrong answer, one partially correct answer, and two plausible answers. Understanding the precise definitions helps you distinguish between the two plausible options.

Time Management on Exam Day

With 90 questions in 90 minutes, you have about 1 minute per question. Flag PBQs and difficult questions for review -- answer all multiple-choice questions first, then return to flagged items. Never leave a question unanswered.


Cross-Reference Index

Labs Mapped to Security+ Domains

Lab Domain(s)
Lab 01: Synthetic Alert Triage 1, 4
Lab 02: Detection Tuning 4
Lab 03: IR Simulation 4
Lab 04: SOAR Safety Checks 4
Lab 06: AD Attack Paths 3
Lab 07: Malware Triage 2
Lab 08: Cloud Security Audit 3
Lab 09: Purple Team Exercise 1, 5
Lab 10: Threat Hunt 2, 4
Lab 12: DFIR Artifact Analysis 4
Lab 15: Purple Team Automation 5
Lab 16: DFIR Memory Forensics 4
Lab 18: Threat Hunting KQL/SPL 4
Lab 21: Cloud Container Security 3
Lab 23: YARA/Sigma Hunting 2, 4
Lab 29: Zero Trust Architecture 1, 3
Lab 30: Vulnerability Triage 2

MicroSims for Hands-On Practice

Explore the MicroSims library for interactive simulations covering:

  • Phishing detection and analysis (Domain 2)
  • SIEM alert investigation (Domain 4)
  • Incident response decision trees (Domain 4)
  • Network segmentation design (Domain 3)
  • Risk assessment calculations (Domain 5)

Scenarios for Deep Practice

Browse the Scenarios library for 100 attack scenarios that reinforce Domain 2 (threats) and Domain 4 (operations) exam objectives through realistic case studies.


Next Steps After Security+

After passing Security+, consider these certification paths that build on the same Nexus SecOps content:

Next Certification Focus Area Key Nexus Chapters
CompTIA CySA+ (CS0-003) SOC analysis, threat hunting Ch04-Ch09, Ch38
CompTIA PenTest+ (PT0-002) Penetration testing Ch16-Ch17, Ch41-Ch48
GIAC GCIH Incident handling Ch09, Ch27-Ch28
(ISC)2 SSCP Security administration Ch13, Ch31-Ch33

See the full Certifications Roadmap for complete career path guidance.