Use this for last-mile review , not first exposure. Read it fast, mark the rows that still cause hesitation, and then return to the exact lesson page that fixes the weakness. Security+ rewards precise thinking about control fit, access scope, evidence handling, and operational practicality.
IAM: Identity and access management, which covers authentication, authorization, privilege control, and account lifecycle.
GRC: Governance, risk, and compliance work that ties policy, risk handling, and evidence together.
CIA / AAA: Confidentiality, integrity, availability and authentication, authorization, accounting.
Fast question-decoding flow
flowchart LR
A["Read the operational constraint"] --> B["Classify the real problem"]
B --> C["Choose the control family or workflow"]
C --> D["Check least privilege, evidence, and business fit"]
D --> E["Eliminate the answer that is broad, vague, or incomplete"]
What to notice:
Security+ often hides the real problem inside the operational detail
the strongest answer usually fits the risk and the workflow at the same time
broad “more security everywhere” answers often lose to narrower, better-targeted controls
Fast routing back into the guide
If you are blank on…
Reopen…
control types, zero trust, change management, crypto basics
1. General Security Concepts
attackers, vectors, vulnerabilities, web attacks, ransomware, mitigation choices
2. Threats, Vulnerabilities & Mitigations
cloud, segmentation, secure design, classification, resilience
3. Security Architecture
hardening, monitoring, IAM operations, automation, incident response, evidence
4. Security Operations
governance, risk, vendors, audits, privacy, awareness
5. Security Program Management & Oversight
Final 20-minute recall
What to ask before you answer
Fast question
Why it helps
Is this mainly a prevention, detection, containment, recovery, or governance problem?
It narrows the control family quickly
Is the scenario really about identity, data, network path, or evidence handling?
It points you to the right lesson page or mental model
Which option preserves least privilege and still works operationally?
Security+ usually rewards that balance
Which tempting answer sounds secure but breaks availability, auditability, or the stated constraint?
This eliminates many distractors
Cue -> best move
If the question says…
Usually strongest answer
Protect admin access quickly
MFA + least privilege + privileged-access discipline
Reduce lateral movement
Segmentation or microsegmentation + tighter access paths
Public web app is at risk
WAF + secure coding fixes + patching + monitoring
Phishing or spoofed mail problem
SPF/DKIM/DMARC + mail filtering + awareness
Ransomware is spreading
Isolate systems, restrict spread paths, preserve evidence, follow IR order
Sensitive data leaving SaaS or cloud
DLP/CASB + strong IAM + logging + encryption or tokenization
Need proof of integrity and sender accountability
Hashing or digital signature, depending on the exact need
Vulnerability backlog is too large
Risk-based prioritization using asset criticality, exploitability, and exposure
Repeated incidents keep happening
Root cause analysis + control improvement + updated runbooks or tabletop practice
Must-memorize anchors
Topic
Fast recall
CIA
Confidentiality, Integrity, Availability
AAA
Authentication, Authorization, Accounting
IR phases
Preparation -> Identification -> Containment -> Eradication -> Recovery -> Lessons learned
Risk treatments
Accept, avoid, transfer, mitigate
Access models
DAC, MAC, RBAC, ABAC
Zero Trust core
Verify explicitly, least privilege, assume breach
Last-minute traps
confusing vector, vulnerability, and malicious activity
calling every auth attack brute force instead of password spraying or credential stuffing
choosing a detective control when the question clearly needs prevention or containment
confusing encryption, hashing, signatures, and encoding
forgetting chain of custody or time synchronization in investigation scenarios
Control and principle quick map
Concept
Fast distinction
Preventive vs detective
stop or reduce first, observe and alert second
Corrective vs compensating
fix after an issue, or substitute when the ideal control is not possible
Managerial vs operational vs technical
policy and oversight, people and process, or enforced by technology
Authentication vs authorization
prove identity, then decide allowed actions
Non-repudiation
prevent denial that a specific action occurred
Threats and mitigations quick map
Pattern
Best memory hook
Password spraying
one password across many users
Credential stuffing
reused credentials from another breach
XSS
attacker script reaches another user’s browser
SQL injection
attacker manipulates database queries through input
Supply-chain attack
trusted software, package, or vendor path is compromised
Shadow IT
unmanaged technology adopted outside policy
Architecture and operations quick map
Need
Strongest first fit
Narrow admin exposure
VPN, MFA, approved path, logging
Device admission control
NAC or 802.1X
Sensitive data visibility without full disclosure
masking or tokenization
Fast recovery with highest cost
hot site
Lowest data-loss window
lower RPO
Fastest containment
isolate affected systems and reduce communication paths
Better detection workflow
telemetry -> correlation -> alert -> triage
Cryptography quick map
Need
Strongest first fit
Confidentiality
encryption
Integrity
hashing or HMAC
Sender proof and integrity
digital signature
Certificate trust validation
PKI chain plus revocation checking
Hide format only
encoding, not security
Do not confuse: Base64 is encoding, not encryption.
Incident response quick map
flowchart LR
A["Preparation"] --> B["Identification"]
B --> C["Containment"]
C --> D["Eradication"]
D --> E["Recovery"]
E --> F["Lessons learned"]
What to notice:
containment comes before eradication
recovery does not mean the review is finished
evidence handling matters whenever legal, audit, or forensics language appears
GRC quick map
Term
Fast distinction
Policy
what the organization requires
Standard
required rule or baseline supporting policy
Procedure
how the task is done
Guideline
preferred but not always mandatory practice
BIA
critical business functions and recovery priorities
Risk register
tracked record of risks, owners, and treatments
High-confusion pairs worth one last look
Pair
Fast distinction
Password spraying vs credential stuffing
one password against many users vs reused breached credentials against one or more accounts
Encryption vs tokenization
protect readable data vs replace sensitive values for workflow safety
HA vs backup
keep the service alive vs restore data or service after loss
Vulnerability management vs incident response
reduce known weakness exposure vs handle active or recent security events
Quiz
This quiz requires JavaScript to run. The questions are shown below in plain text.
Loading quiz…
From here, use the study plan for pacing, the glossary when terms blur together, or the resources page when you need the official CompTIA references.