High-yield review of security concepts, architecture, IAM, crypto, cloud controls, detection, incident response, and governance for CompTIA Security+.
On this page
Use this for last-mile review. Read it quickly, mark the rows you still hesitate on, and then go back to targeted practice or deeper explanations only for those weak spots.
Final 20-minute recall (exam day)
Cue -> best move (scenario map)
If the question says…
Usually best answer
Protect admin accounts immediately
MFA + least privilege + privileged access controls
Phishing-resistant auth
FIDO2/WebAuthn or certificate-based factors
“Assume breach” architecture
Zero Trust segmentation + continuous verification + telemetry
Public web app attack reduction
WAF + secure coding fixes + patching + monitoring
Ransomware containment
Isolate hosts, disable spread paths, preserve evidence, follow IR workflow
Data exfil concern in SaaS/cloud
DLP/CASB + strong IAM + logging + encryption
Need integrity + non-repudiation
Digital signatures + PKI controls
Certificate trust failure
Validate chain, SAN, expiration, revocation, and trust store
Vulnerability backlog too large
Risk-based prioritization using asset criticality, exploitability, and exposure
Repeated incidents
Root-cause analysis + control improvement + updated runbooks/tabletops
Symmetric for speed, asymmetric for exchange/signature, hashing for integrity
Zero Trust core
Verify explicitly, least privilege, assume breach
Last-minute traps
confusing encoding, hashing, and encryption
choosing broad trust instead of identity-aware least privilege
stopping at detection without thinking about containment and recovery
ignoring evidence handling, chain of custody, or policy fit in an incident
1) Core principles
CIA Triad: confidentiality, integrity, availability
AAA: authentication, authorization, accounting
Defense in depth: layered controls across people, process, and technology
Zero Trust: verify explicitly, use least privilege, assume breach, segment and monitor
2) Threat actors and intelligence
Actor
Motive
Capability
Notes
Script kiddie
curiosity or disruption
low
relies on public tools
Hacktivist
ideology
varies
public-facing disruption is common
Criminal group
money
medium to high
ransomware, fraud, extortion
Insider
mixed
high context
may be careless or malicious
Nation-state / APT
strategic
very high
persistence and stealth matter
Intel types: OSINT, HUMINT, SIGINT, TECHINT, vendor feeds. Pyramid of Pain: indicators like hashes and IPs are easiest for attackers to change; TTPs are harder.
3) Common attacks
Social engineering: phishing, spear phishing, vishing, smishing, pretexting, baiting, tailgating