CompTIA Security+ prep, SY0-701 roadmap with ARIA
CompTIA Security+ SY0-701 is 90 minutes, up to 90 questions including performance-based items, a 750 out of 900 passing score (about 75 percent), and the most-sat entry-level cybersecurity certification on the planet. CompTIA recommends Network+ and around two years of IT experience, but neither is enforced. I prep you for it with an adaptive evaluation, a roadmap weighted toward Security Operations and Threats, a daily task engine, and a pass guarantee tied to five measurable conditions. Start your free CAT evaluation at claudelab.me/onboarding/select-cert?code=Security%2B.
TL;DR
- 90 minutes, up to 90 items, 750 out of 900 passing score, intermediate level, five domains weighted toward Security Operations at 28 percent.
- Performance-based questions (PBQs) front-load the exam: drag-drop, scenario simulation, log analysis. Get them out of the way early and budget time for them.
- I open with a 15-to-25-question CAT eval that lands a domain-by-domain skill estimate across all five SY0-701 domains.
- Roadmap milestones cluster on Security Operations and Threats (50 percent of the exam combined), with explicit drill on the four classic concept-confusion traps.
- Pass-guarantee eligibility is checked by a database function with five mechanical conditions, not a marketing line.
What the SY0-701 exam is
SY0-701 is the current CompTIA Security+ exam, released in late 2023 and still active in 2026. It tests foundational cybersecurity concepts, threat identification, security architecture, day-to-day security operations, and program management at an intermediate level. The format: up to 90 questions in 90 minutes, scaled scoring 100 to 900, passing at 750. Questions are multiple choice (single and multiple response) plus performance-based items.
The blueprint splits into five domains.
| Domain | Weight | What it covers |
|---|---|---|
| 1.0 General Security Concepts | 12% | CIA triad, security controls (technical, managerial, operational, physical), zero trust, deception and disruption, change management, cryptographic solutions (symmetric, asymmetric, hashing, PKI, digital signatures). |
| 2.0 Threats, Vulnerabilities, and Mitigations | 22% | Threat actors and motivations, attack surfaces, application and network attacks, malware variants, vulnerability identification (CVE, CVSS), mitigation techniques (patching, segmentation, hardening). |
| 3.0 Security Architecture | 18% | Network architecture (segmentation, SDN, SASE), cloud and virtualization security, IaC, secure data design, resilience (high availability, backups, recovery), enterprise security (firewalls, IDS / IPS, proxies). |
| 4.0 Security Operations | 28% | Identity and access management, hardening, monitoring (SIEM, NetFlow, packet capture), vulnerability management, incident response (preparation, detection, containment, eradication, recovery, lessons learned), digital forensics. |
| 5.0 Security Program Management and Oversight | 20% | Governance (policies, standards, procedures), risk management (assessment, types, register, BIA), third-party risk, compliance, audits, security awareness. |
Security Operations is the largest single domain at 28 percent, with Threats right behind at 22 percent. Half the exam sits in those two. A roadmap that splits time evenly across all five wastes the prep window.
Performance-based questions (PBQs)
PBQs are the format that catches first-timers. CompTIA shows two to five at the start of the exam, before the multiple-choice block. They take three forms:
- Drag-and-drop firewall rule ordering, port-to-protocol matching, control-to-category mapping.
- Scenario simulation with multiple linked questions about a topology diagram, a SIEM alert, or an incident timeline.
- Log and command output reading where you identify the attack, the misconfiguration, or the next step from snippets.
PBQs are not interactive lab consoles. They are scenario logic dressed in an interface. Treat them as harder multiple-choice with more context, budget about 90 seconds each, and flag-and-return any that bleed past three minutes.
Where Security+ sits in the cybersecurity ladder
Security+ is the global entry-level cybersecurity certification. CompTIA reports more than 700,000 holders worldwide; US federal employers and contractors treat it as the default baseline credential under DoD 8570 / 8140. CySA+ (Cybersecurity Analyst+) is the defensive blue-team follow-on with deeper SOC, detection, and incident-response content. PenTest+ is the red-team counterpart covering scoping, scanning, exploitation, and reporting. Most candidates take Security+ first, then choose CySA+ or PenTest+ based on direction.
How ARIA preps you for it
ARIA owns your Security+ prep end to end. Five pieces, each one running every day you are in the program.
The CAT evaluation. Your first session is a 15-to-25-question adaptive test that converges on your real skill across the five SY0-701 domains. Difficulty adjusts after every answer. The test stops at 95 percent confidence or 25 questions, whichever comes first. The output is a domain-by-domain estimate that decides what your roadmap looks like. Read the full CAT explainer for the mechanics.
The personalized roadmap. The moment the eval closes, I generate three to five phases sequenced from your weakest SY0-701 domain to your strongest, each with two to four milestones. Milestone count scales with starting level: novice on Security Operations gets the most milestones; proficient on General Concepts gets the fewest. Because Operations and Threats together carry half the exam, the roadmap front-loads them unless your CAT baseline says otherwise. Full structure: the roadmap overview.
The daily task engine. Every time you reopen the app, I pick the next thing to work on, today. One task. Not a list. The engine weighs active milestone, error backlog, readiness decay, and schedule drift, then surfaces the single highest-value action via the Today Task card. Roadmap tasks advance milestones; free-play tasks improve readiness but do not.
The error backlog with security-concept-confusion tags. Every wrong answer on a Security+ item is tagged with the trap pattern, domain, and topic. Four tags get special weight on this cert because they account for a large share of misses: AAA (authentication vs authorization vs accounting), IDS-vs-IPS, symmetric-vs-asymmetric crypto, and risk types (inherent vs residual vs control). Tagged items return at increasing intervals (1 day, 3 days, 7 days, 21 days) and retire only after three correct in a row, spaced.
The readiness score. A single 0-to-100 number that estimates your probability of passing Security+ today. It blends coverage, accuracy, and recency, and decays roughly 3 points per day of inactivity past the grace window. At 60 it unlocks the demo test, at 80 the gauntlet. With every milestone done, two mock passes, one gauntlet pass, and live readiness at 80, the pass guarantee flips eligible.
Common pitfalls on Security+ SY0-701
These are the questions that quietly cost the most points on this exam. Every prep tool calls them out. Few do anything structural about them.
1. Authentication vs authorization vs accounting (AAA)
The trap: all three start with A, all three live next to each other in any IAM diagram, and the exam writes stems where two of them sound right. Authentication proves who you are (password, token, biometric). Authorization decides what you can do (RBAC, ABAC, policy). Accounting records what you did (logs, audit trail, session metadata). A question about MFA failing on a privileged action could test any of the three depending on what the stem actually asks.
What I do about it: every miss on AAA gets tagged as AAA-confusion and the backlog ships back stems that swap the asked-about layer. The pattern retires only when you split the three cold across three consecutive correct answers.
2. IDS detects, IPS prevents
The trap: both inspect traffic, both pattern-match, both can sit inline. The difference is action. An IDS reads traffic out-of-band and raises alerts; the packet still reaches the destination. An IPS sits inline and can drop, reset, or block the packet before it arrives. Picture the traffic flow: IDS taps off a SPAN port and watches; IPS sits in the wire and decides. Exam stems hide this behind words like "signature-based" or "anomaly-based" that apply to both, then ask which device the architecture needs.
What I do about it: drills include the inline-vs-tap topology question, the false-positive cost trade-off, and the network-vs-host variant (NIDS, NIPS, HIDS, HIPS). Every miss tags the IDS-IPS pattern and the backlog returns the inline-action variant first.
3. Symmetric (fast, shared key) vs asymmetric (PKI, slower) crypto
The trap: both are "encryption" and the exam loves stems that hint at speed, scale, or key distribution without naming them. Symmetric (AES, ChaCha20) uses one shared key, runs fast, scales poorly because every pair needs a unique key. Asymmetric (RSA, ECC) uses a public-private keypair, runs slower by orders of magnitude, scales because the public half is freely shareable. In practice TLS uses asymmetric to exchange a symmetric session key, then symmetric for the bulk traffic. Get the use case wrong and you reach for the wrong primitive.
What I do about it: tag every miss with crypto-confusion and rotate variants (key exchange, digital signature, bulk encryption, certificate chains). I drill the hybrid pattern explicitly because it shows up on Domain 1 and Domain 3.
4. Risk types: inherent vs residual vs control
The trap: three risk concepts that sound interchangeable and are not. Inherent risk is the raw risk before any controls are applied. Residual risk is what remains after controls are applied. Control risk is the risk that the control itself fails or is bypassed. The exam writes stems about a SOC report or a risk register and asks which type a specific number represents.
What I do about it: every miss tags risk-type-confusion and the backlog returns scenarios that name the controls explicitly so you can isolate which type the stem is asking about. The Domain 5 risk milestone does not validate until the three are split cold.
5. PBQ-specific traps
Beyond the four concept traps, the performance-based section has its own consistent failure modes:
- Firewall rule ordering with the implicit deny placed anywhere except last (it is always last; rules above it must allow what is needed).
- Port-to-protocol matching where TLS-wrapped variants (HTTPS 443, SMTPS 465 / 587, IMAPS 993, LDAPS 636) get swapped with their plaintext counterparts.
- Log-source identification where the candidate misreads a Sysmon line as a firewall log or an Apache access entry as a SIEM alert.
What I do about it: PBQ drills mirror the actual exam format (drag-drop ordering, snippet identification, scenario reasoning) and every miss tags the PBQ subtype so the backlog brings the right variant back.
Common questions
Do I need Network+ before sitting Security+ SY0-701?
CompTIA recommends Network+ and roughly two years of IT administration experience, but neither is enforced at the exam center. Most candidates without Network+ struggle on the architecture domain because subnetting, ports, and protocol behavior show up everywhere. The CAT evaluation surfaces that gap on day one and the roadmap closes it before you reach Phase 2.
How does ARIA cover Security+ performance-based questions without an interactive simulation?
Performance-based questions on SY0-701 are scenario logic, not real lab consoles. ARIA drills the underlying decisions: firewall rule order with implicit deny last, port-to-protocol matching, log-source identification, and command output reading. Every drill matches the question pattern on the actual exam, and every miss tags the specific PBQ format so the backlog brings the right variant back.
How long does Security+ prep take at 30 to 45 minutes per day?
At 30 minutes per day, median time-to-ready sits between eight and twelve weeks. At 45 minutes, six to nine weeks. The roadmap is sized from your CAT baseline, not a marketing window. A novice on Security Operations and Threats gets the longest plan; someone with helpdesk or junior SOC time lands closer to six weeks.
What is the difference between SY0-701 and the older SY0-601?
SY0-701 is the current version (released late 2023 and still active in 2026). It collapses the older six-domain blueprint into five, adds zero trust and IaC security, expands cloud and supply-chain content, and updates threat actor categories. SY0-601 retired in mid-2024, so the only valid attempt today is SY0-701.
Is Security+ a useful stepping stone to CISSP or CCSP?
Yes, with caveats. Security+ covers the breadth of foundational security concepts that CISSP assumes you already own. It does not satisfy CISSP's five-year experience requirement and does not approach CISSP's depth on governance, risk management, or software security. Treat Security+ as the language, then build experience or take SSCP and CySA+ before approaching CISSP or CCSP.
Does Security+ count for DoD 8570 or 8140 compliance?
Security+ (CE version, which is the standard) satisfies DoD 8570 baseline requirements at IAT Level II, IAM Level I, and CSSP Infrastructure Support, Incident Responder, and Auditor roles. The 8140 framework that supersedes 8570 also recognizes Security+ as a qualifying credential for several work roles. This is one of the larger reasons US federal contractors require it.
How is Security+ different from CySA+ and PenTest+?
Security+ is the entry-level breadth credential covering concepts, threats, architecture, operations, and governance. CySA+ is the defensive analyst follow-on, focused on detection, log analysis, and incident response with deeper SOC content. PenTest+ is the offensive counterpart, covering scoping, scanning, exploitation, and reporting. Security+ first, then choose CySA+ or PenTest+ based on whether you want blue-team or red-team work.
Start your CompTIA Security+ prep
The cheapest possible signal is the 15-minute CAT evaluation. It tells you which of the five SY0-701 domains you actually own, which one will cost you the exam if you sit it tomorrow, and where the roadmap starts. After that, you decide whether to commit.
Start your free Security+ evaluation now.
Background reading: the AI cert prep guide covers the four categories of AI prep tools, readiness and decay explains the score that drives the experience, and practice sessions walks through how the daily lane shows up in the app.