CompTIA Security+ SY0-701 Domain Breakdown — Weights, Topics & Sample Questions
Every Security+ SY0-701 domain explained: how much it counts, which subtopics are hardest, what question types to expect, and a sample Security+ question for each.
Exam Weight at a Glance
The table above is the starting point for any study plan. Domain 4 (Security Operations) at 28% is the single most important domain — getting it wrong will fail you regardless of performance elsewhere. Together, Domains 2 and 4 account for 50% of the exam.
Below is a complete breakdown of each domain with the topics that matter most, sample Security+ questions, and links to targeted practice.
Domain 1: General Security Concepts
Hardest Subtopics
- Security control categories & types — 3×4 matrix (Technical/Managerial/Operational/Physical × Preventive/Detective/Corrective/Deterrent/Compensating/Directive)
- Choosing the correct cryptographic algorithm for a specific requirement (AES vs RSA vs ECC vs DH)
- Zero Trust concepts: control plane, data plane, policy enforcement point, policy decision point
- Authentication protocols: Kerberos vs NTLM vs RADIUS vs TACACS+ — when each is used
Typical Question Types
A security team wants to verify that patch deployments did not introduce new configurations. Which control type BEST addresses this?
Domain 2: Threats, Vulnerabilities & Mitigations
Hardest Subtopics
- Distinguishing malware types from behaviour: rootkit (hides in kernel) vs spyware (exfiltrates data) vs ransomware (encrypts files) vs worm (self-propagates) vs logic bomb (triggers on condition)
- Social engineering technique identification: phishing vs vishing vs smishing vs spear phishing vs whaling vs pretexting vs tailgating vs watering hole
- Wireless attack types: evil twin vs deauthentication vs KRACK vs WPS attacks — identifying from scenario clues
- Application vulnerabilities: SQL injection vs XSS vs CSRF vs buffer overflow — identifying from log patterns
- Threat intelligence concepts: STIX/TAXII, IOC vs IOA, TTP, threat actor attribution
Typical Question Types
An analyst notices that users are receiving emails that appear to come from the CFO, requesting urgent wire transfers. No malware is detected. Which attack is MOST likely?
Domain 3: Security Architecture
Hardest Subtopics
- Cloud service and deployment models: SaaS/PaaS/IaaS responsibility boundaries (the shared responsibility matrix)
- Network segmentation tools: VLAN vs firewall vs DMZ vs microsegmentation vs SD-WAN
- Zero Trust architecture components: SASE, ZTNA, IAM, identity-aware proxy, policy enforcement points
- High availability designs: active-active vs active-passive, load balancers, geographic distribution
- Infrastructure as Code security: immutable infrastructure, drift detection, secrets management in pipelines
Typical Question Types
A company is migrating to SaaS applications and wants to enforce data loss prevention policies across all cloud services without deploying agents on every endpoint. Which solution is BEST?
Domain 4: Security Operations
Hardest Subtopics
- Incident response phase ordering (PICERL) — especially knowing WHEN exactly Contain vs Eradicate vs Recover happens
- SIEM, SOAR, EDR, XDR, and MDR distinctions — and which tool fits which scenario
- Vulnerability scanning vs penetration testing: scope, authorisation, output, timing
- Log analysis: identifying attack patterns from firewall logs, auth logs, DNS logs, web server logs
- Hardening procedures: default password changes, disabling unnecessary services, OS baselines, application allow-listing
Typical Question Types
During an incident investigation, forensic analysts are collecting evidence. They have access to a running server with active user sessions, a log server, and backup tapes. In what order should they collect evidence according to the order of volatility?
Domain 5: Security Program Management & Oversight
Hardest Subtopics
- Risk calculation: SLE (Single Loss Expectancy) = AV × EF, ALE = SLE × ARO — producing the right number and using it to justify control cost
- Compliance framework mapping: HIPAA vs PCI-DSS vs SOX vs GDPR vs CMMC — which regulation applies to which business type
- Data classification: public vs internal vs confidential vs restricted — and which controls are required at each level
- Privacy concepts: data subject rights under GDPR (right to access, erasure, portability), data controller vs data processor, DPA
- Third-party risk: vendor assessments, supply chain attacks, right-to-audit clauses, due diligence
Typical Question Types
A healthcare organisation stores patient records and processes credit card payments. Which combination of compliance frameworks are REQUIRED?
Frequently Asked Questions
Which Security+ domain is hardest?
Can I skip a domain if the weight is low?
Are all question types tested in every domain?
Test Every Domain — 540 Security+ Questions
Our domain-filtered practice mode lets you attack your weakest domain directly — until it is no longer weak.