Skip to main content
CompTIA 🇺🇸 · 10 min read

CompTIA Security+ SY0-701 Study Guide 2026: Everything You Need to Know

CompTIA Security+ SY0-701 is the world's most popular entry-level cybersecurity certification and a DoD-approved baseline credential. This 2026 guide breaks down every domain, shares three realistic sample questions, and gives you a proven study roadmap to pass on your first attempt.

The CompTIA Security+ SY0-701 is the most widely recognized entry-level cybersecurity certification in the world. It validates that you understand core security concepts, can identify and mitigate common threats, and know how to apply security controls across networks, applications, and cloud environments. It is approved under US DoD Directive 8140, meaning it satisfies baseline requirements for civilian and military IT positions. Whether you are starting a career in security, adding a credential to a networking or sysadmin background, or fulfilling a job requirement, this guide will show you exactly how to prepare for the SY0-701 exam in 2026.

Exam Overview and Registration

The SY0-701 version launched in November 2023 and remains the current version through at least 2026. Here is everything you need to know about the exam logistics before starting your preparation:

Detail Value
Number of Questions Maximum 90 questions
Time Limit 90 minutes
Passing Score 750 out of 900
Exam Cost $392 USD
Delivery Pearson VUE testing center or online proctored
Question Types Multiple choice, drag-and-drop, fill-in-the-blank, performance-based
Validity 3 years (renewable through CE credits or retake)
Languages English, Japanese, Portuguese, Spanish

The SY0-701 introduced performance-based questions (PBQs) at the start of the exam. These are interactive scenarios — simulated network diagrams, log files to analyze, drag-and-drop firewall rule ordering — and they can take 5–10 minutes each. Budget your time accordingly and do not get stuck on a PBQ if it is unclear. Flag it and return after answering the multiple-choice questions.

The Five Exam Domains

Understanding how questions are distributed across domains helps you spend study time where it matters most. The SY0-701 blueprint allocates question weight as follows:

Domain 1: General Security Concepts — 12%

This domain covers foundational vocabulary and concepts that underpin all security work: authentication vs authorization, non-repudiation, the CIA triad (Confidentiality, Integrity, Availability), types of controls (preventive, detective, corrective, deterrent, compensating), cryptography basics, and the differences between symmetric and asymmetric encryption. While it carries the lowest weight, it provides essential vocabulary for all other domains — candidates who are weak here tend to struggle with scenario questions in heavier domains.

Domain 2: Threats, Vulnerabilities, and Mitigations — 22%

This is where attack types live: phishing, spear phishing, vishing, smishing, whaling, business email compromise (BEC), malware families (ransomware, rootkits, keyloggers, trojans, worms), SQL injection, XSS, CSRF, buffer overflow, race conditions, and zero-day exploits. You must also know how to use vulnerability scanners, CVSS scoring, and penetration testing phases (reconnaissance, scanning, exploitation, post-exploitation, reporting).

Domain 3: Security Architecture — 18%

Architecture covers network segmentation (DMZ, VLANs, microsegmentation), secure network design, Zero Trust principles, cloud security models (IaaS/PaaS/SaaS shared responsibility), infrastructure as code (IaC) security, SASE (Secure Access Service Edge), SD-WAN, and endpoint protection strategies including EDR, MDM, and application allow-listing.

Domain 4: Security Operations — 28%

The largest domain by weight, Security Operations tests your ability to respond to incidents and manage day-to-day security tasks. Topics include identity and access management (MFA, SSO, PAM, RBAC vs ABAC), digital forensics (chain of custody, acquisition order, volatile vs non-volatile data), log analysis (SIEM tools, syslog, Windows Event IDs), incident response phases (preparation, detection, containment, eradication, recovery, lessons learned), and data loss prevention (DLP). This domain is where candidates who "learned theory but never touched a tool" most often lose points — hands-on lab practice is essential.

Domain 5: Security Program Management and Oversight — 20%

This domain bridges technical security with governance and compliance. It covers risk management (risk identification, assessment, appetite, tolerance), frameworks (NIST CSF, ISO 27001, SOC 2), data classification, privacy regulations (GDPR, HIPAA, CCPA), security awareness training, third-party risk management (vendor questionnaires, SLAs, right-to-audit clauses), and business continuity planning (BCP vs DRP, RTO, RPO, MTTR, MTBF).

Who Should Take Security+ and Prerequisites

CompTIA does not require any formal prerequisites for Security+. You can register and sit the exam with no prior certifications. That said, CompTIA officially recommends:

  • CompTIA Network+ or equivalent networking knowledge (subnets, TCP/IP, DNS, routing basics)
  • At least 2 years of IT work experience in a security-adjacent role

In practice, candidates with no networking background often struggle with Domain 3 (Security Architecture) questions about firewall rules, VLANs, and network segmentation. If you are completely new to IT, consider spending 4–6 weeks studying networking fundamentals or completing the CompTIA Network+ curriculum (even without sitting that exam) before starting your Security+ preparation.

💡 Pro Tip: CompTIA regularly releases bundle discounts that include both the exam voucher and study materials (CertMaster Learn + Labs). If you plan to use official materials, buying the bundle often saves $100 or more compared to purchasing separately. Check CompTIA's store around Black Friday for the deepest discounts.

3 Sample Questions with Explanations

The following questions reflect the scenario-driven format of the SY0-701 exam. The exam rewards understanding over memorization, so practice explaining your reasoning, not just selecting answers.

Question 1

A security analyst receives an alert that an employee's workstation is communicating with an external IP address on port 4444 at regular 60-second intervals. The workstation shows no unusual CPU usage and the user reports no issues. Which type of threat does this MOST likely indicate?

  • A. Ransomware encrypting files in the background
  • B. A command-and-control (C2) beacon from a remote access trojan
  • C. A port scan from a remote attacker
  • D. A misconfigured scheduled task causing DNS lookup failures

Correct Answer: B

Explanation: Regular outbound communication at fixed intervals — called "beaconing" — is the hallmark of a command-and-control (C2) connection used by remote access trojans (RATs) and other malware to maintain persistence. Port 4444 is commonly associated with Metasploit's default reverse shell listener. The absence of high CPU usage and user-visible symptoms is consistent with a stealthy RAT designed to avoid detection. Ransomware (A) would typically show high disk I/O and file extension changes. A port scan (C) would originate from the external IP inbound, not the workstation outbound. A misconfigured scheduled task (D) would not establish sustained TCP sessions to an external IP.

Question 2

A company is implementing a new policy requiring all employees to use multi-factor authentication (MFA) when accessing corporate resources remotely. An administrator must choose the MOST phishing-resistant MFA method. Which should they select?

  • A. SMS-based one-time passcodes (OTP)
  • B. Email-based one-time passcodes
  • C. FIDO2/WebAuthn hardware security keys
  • D. TOTP authenticator app (Google Authenticator, Authy)

Correct Answer: C

Explanation: FIDO2/WebAuthn hardware security keys (such as YubiKey) are the gold standard for phishing-resistant MFA because authentication is cryptographically bound to the origin domain. A phishing site cannot replay or intercept the authentication even if the user visits it, because the key verifies the relying party's domain. SMS OTPs (A) are vulnerable to SIM-swapping attacks and real-time phishing proxy attacks. Email OTPs (B) are vulnerable to account takeover if the email account is compromised. TOTP apps (D) are significantly better than SMS but are still vulnerable to real-time adversary-in-the-middle (AiTM) phishing attacks where the attacker relays the OTP instantly.

Question 3

A penetration tester has gained initial access to a corporate network and wants to move laterally to a database server without triggering endpoint detection. Which technique BEST describes using legitimate, pre-installed tools to achieve this goal?

  • A. SQL injection
  • B. Living off the land (LotL)
  • C. Privilege escalation via kernel exploit
  • D. Watering hole attack

Correct Answer: B

Explanation: Living off the land (LotL) refers to using tools and binaries already present on the target system — such as PowerShell, WMI, PsExec, certutil, or net.exe — to conduct malicious activities. Because these are legitimate system tools, they are less likely to trigger signature-based detection. SQL injection (A) is a web application attack vector, not a lateral movement technique. Privilege escalation (C) elevates permissions but does not describe lateral movement. A watering hole attack (D) is an initial access technique involving compromising websites that targets are likely to visit.

Ports and Protocols Cheat Sheet

Memorizing common port numbers is one of the most efficient investments you can make for the Security+ exam. Questions regularly ask you to identify a protocol by its port or recognize that a specific port being open indicates a security risk. Learn these cold:

Port(s) Protocol Security Note
20/21 FTP Unencrypted; replace with SFTP (22) or FTPS (990)
22 SSH / SFTP / SCP Encrypted remote access and file transfer
23 Telnet Unencrypted; should never be open in production
25 SMTP Email sending; use port 587 (STARTTLS) or 465 (SMTPS)
53 DNS Use DNSSEC to prevent spoofing; DNS over HTTPS on 443
80 HTTP Unencrypted web traffic; redirect to HTTPS (443)
110 POP3 Unencrypted email retrieval; use POP3S on 995
143 IMAP Unencrypted email access; use IMAPS on 993
389 LDAP Directory services; use LDAPS on 636 for encryption
443 HTTPS / TLS Encrypted web traffic; enforce TLS 1.2 or 1.3
445 SMB Windows file sharing; disable SMBv1 (EternalBlue target)
1433 MS SQL Server Should never be exposed to the internet
3306 MySQL / MariaDB Should be behind a firewall, not internet-facing
3389 RDP Brute-force target; use VPN or jump host, never expose directly
1812/1813 RADIUS AAA for network access control (Wi-Fi, VPN)

Best Study Resources

The Security+ community has produced excellent free and paid resources. You do not need to buy everything — pick one video course, one practice exam resource, and supplement with free materials.

Free Resources

  • Professor Messer (professormesser.com): The most popular free Security+ video course. Messer covers every exam objective in detail, and his study groups and notes documents are invaluable. His practice exams are affordable and closely mirror the real exam format.
  • CompTIA CertMaster Learn (free trial): CompTIA offers a limited free trial of their official learning platform, which includes interactive lessons and a performance tracker mapped to exam objectives.
  • NIST glossary (csrc.nist.gov): When studying cryptography, risk management, or governance terms, the NIST Computer Security Resource Center is the authoritative source that CompTIA references.

Paid Resources

  • Jason Dion (Udemy): Excellent scenario-heavy video course with bundled practice exams. Dion's practice questions are scenario-based and close to exam difficulty.
  • CompTIA CertMaster Labs: Hands-on labs in a browser-based environment that walk through real-world tasks without requiring local software installation.
  • Mike Chapple / David Seidl "CompTIA Security+ Study Guide": The official Sybex study guide is thorough and well-organized for candidates who prefer reading over video.

Career Paths After Security+

Security+ is a milestone, not a destination. Here is how it maps to real career trajectories and where to go next depending on your interests:

Career Path Next Certification Typical Job Titles
Security Analyst / SOC CompTIA CySA+ (CS0-003) SOC Analyst Tier 1/2, Threat Hunter
Penetration Testing CompTIA PenTest+ or CEH Junior Penetration Tester, Red Team Analyst
Cloud Security AWS Security Specialty or Microsoft SC-200 Cloud Security Engineer, Security Architect
GRC / Compliance ISACA CISM or ISO 27001 Lead Auditor GRC Analyst, Compliance Officer, Risk Manager
Senior / Management ISC2 CISSP or CCSP Security Manager, CISO, Security Architect
💡 Pro Tip: CompTIA's Continuing Education (CE) program lets you renew Security+ by earning 50 CE credits over three years through activities like completing higher-level CompTIA exams (each renews Security+ automatically), attending security conferences, completing online training, or publishing security articles. Plan your renewal strategy from day one so you are never forced to retake the exam.

Ready to Practice?

Test your knowledge with our full CompTIA Security+ SY0-701 practice exam — 340 scenario-based questions, detailed explanations, and no login required to get started.

Browse Practice Exams →

Comments

Sign in to leave a comment.

No comments yet. Be the first!

Comments are reviewed before publication.