Over 10 years we help companies reach their financial and branding goals. Engitech is a values-driven technology agency dedicated.

Gallery

Contacts

411 University St, Seattle, USA

engitech@oceanthemes.net

+1 -800-456-478-23

Domain 4 of 5 Light
COMPTIA · SECURITY+ · STUDY GUIDE · DOMAIN 4

Domain 4: Security Operations

The biggest slice of the exam — 28%. This is the daily work: harden baselines, track assets cradle to grave, find and fix vulnerabilities, watch the telemetry, grant the right access, automate the repeatable, and run incidents when everything breaks.

28%
Exam Weight
9
Objectives
~70m
Read Time
SY0-701
Exam Code
Domain 4 — 28% of exam (largest)100%
All Domains
01Key Concepts at a Glance

Six Ideas That Drive Every Domain 4 Question

Operations is where controls meet reality. Master these six and you can reason through almost any Domain 4 scenario — hardening, vuln management, monitoring, IAM, automation, or incident response.

B

Baseline, Then Drift

A documented, enforced, monitored secure baseline is the foundation. Everything else detects drift from it.

“You can’t tell what’s wrong until you’ve defined what’s right. Establish, deploy, maintain — CIS Benchmark or DISA STIG, Group Policy or Ansible, monitored continuously.”

Deep dive in 4.1 Secure Baselines
A

Own It Cradle to Grave

Asset management means a named owner, classification, a CMDB entry, and a sanitization method at end of life.

“No named owner = no patching, no retirement, no accountability. The CMDB is the spine of vuln management, incident response, and disposal.”

Deep dive in 4.2 Asset Management
V

CVSS ≠ Risk

CVSS is technical severity. Risk = severity x exposure x asset value x threat activity. Prioritize by risk, not score.

“A CVSS 9.8 on an isolated internal box is lower risk than a 7.5 on an internet-facing crown-jewel service under active exploitation. The exam rewards this nuance.”

Deep dive in 4.3 Vulnerability Management
T

Telemetry Before Tooling

SIEM correlates; SOAR automates; EDR watches endpoints; XDR stitches them. Pick by what question you need answered.

“NetFlow tells you who talked to whom cheaply. PCAP tells you what they said expensively. Tune log sources for detection value, not for completeness.”

Deep dive in 4.4 Monitoring & Alerting
I

Identity Is the Perimeter

Least privilege, JIT elevation, MFA across factor categories, attestation, and lifecycle automation — that’s modern access control.

“Password + security question isn’t MFA — both are knowledge factors. Standing admin access on 40 engineers is the risk; JIT elevation + PAM + logging is the answer.”

Deep dive in 4.6 Identity & Access
R

Contain Before You Chase

IR lifecycle: Prepare → Identify → Contain → Eradicate → Recover → Lessons Learned. Containment before eradication every time.

“Stop the bleeding before you rebuild. Preserve evidence with chain of custody, legal hold, and order-of-volatility captures — don’t reboot the forensic witness.”

Deep dive in 4.8 Incident Response
↓ Download Domain 4 Cheat Sheet (PDF)
Incident Response Lifecycle — The Six Phases (4.8)
Phase
Purpose
Exam Signal
1. Preparation
IR plan, roles, comms tree, tooling, training, tabletop exercises.
Before anything happens. Plan exists, people know roles.
2. Identification
Detect, triage, confirm incident vs event, declare.
SIEM alert, user report → is this real? Declare or close.
3. Containment
Stop the spread. Short-term isolate; long-term segment.
Unplug, block, disable account. Before eradication.
4. Eradication
Remove the adversary and artifacts; close the root cause.
Rebuild from gold image, revoke creds, patch the CVE.
5. Recovery
Return to production with monitoring; validate clean.
Staged restoration, heightened logging, watch for re-entry.
6. Lessons Learned
Post-incident review, timeline, control gaps, update runbook.
No blame. Feed findings back into Preparation.
02Diagnostic Quiz

Find Out Where to Start

5 questions across Domain 4 — see which objectives need the most work.

Focus on these objectives

    You’ve got these

      03Objective Navigator

      9 Objectives — Pick Your Path

      Each lesson teaches through real scenarios — concept, textbook, hard choice, exam signal. Start anywhere or go in order. Completed lessons show a checkmark.

      4.1
      Secure Baselines & Hardening Free

      Establish, deploy, and maintain secure baselines (CIS Benchmarks, DISA STIGs). Harden workstations, servers, mobile, wireless, cloud, IoT, ICS/SCADA, embedded, and RTOS. Enforcement via Group Policy, MDM, Ansible / Chef / Puppet, and drift detection.

      4.2
      Asset Management Free

      Acquisition, assignment, named owners, classification, CMDB / inventory, monitoring and tracking, end-of-life disposal. NIST 800-88 sanitization (Clear / Purge / Destroy), media-to-method matrix (degaussing, crypto-erase, shred), data retention vs archival.

      4.3
      Vulnerability Management Free

      Scan types (authenticated vs unauthenticated, SAST, DAST, package monitoring), threat feeds, OSINT, bug bounty, pen tests, CVE and CVSS vs risk, prioritization, remediation (patch, segment, compensating control, exception), validation, reporting.

      4.4
      Monitoring & Alerting Free

      Systems, applications, and infrastructure telemetry. SIEM, SOAR, EDR, XDR, log aggregation, NetFlow vs PCAP, SCAP, agent vs agentless, SNMP, alert tuning, quarantine, report generation, archival.

      4.5
      Enterprise Security Capabilities Free

      Firewall rules and ACLs, IDS/IPS signatures, web filters (URL scan, agent-based, CASB), DNS filtering, email security (DMARC, DKIM, SPF, gateway), file integrity monitoring, DLP, NAC, EDR/XDR tuning, user behavior analytics.

      4.6
      Identity & Access Management Free

      Provisioning / deprovisioning, federation (SAML, OIDC), SSO, LDAP, OAuth, interoperability, attestation, access control models (RBAC, ABAC, MAC, DAC, rule-based), MFA factor categories (know / have / are / where / do), password managers, passwordless, PAM (JIT, ephemeral, vaulting).

      4.7
      Automation & Orchestration Free

      Use cases (user provisioning, guard rails, resource allocation, ticket enrichment, escalation, security groups, continuous integration / delivery, API integrations), benefits (efficiency, reaction time, consistency), considerations (complexity, cost, fragility, technical debt, single point of failure).

      4.8
      Incident Response Free

      Six phases (prepare, identify, contain, eradicate, recover, lessons learned). Training, testing (tabletop, simulation), root cause analysis, threat hunting, digital forensics — legal hold, chain of custody, acquisition, reporting, preservation, e-discovery.

      4.9
      Investigation Data Sources Free

      Log data (firewall, application, endpoint, OS-specific, IPS/IDS, network, metadata), data sources (vulnerability scans, automated reports, dashboards, packet captures) — and how to match the investigative question to the data source that actually answers it.

      🔨

      Operations drills and adaptive quizzes — Coming Soon

      TJS Platform will have SIEM triage scenarios, MFA factor puzzles, IR phase sequencing, and AI-powered explanations for every Domain 4 objective.

      Coming Soon
      04Memory Aids

      Learn It, Test It, Lock It In

      Each card has 3 layers. Click to advance: mnemonicscenario challengeanswer + exam tip.

      0 / 6 mastered
      IR Phases
      Preparation · Identification · Containment · Eradication · Recovery · Lessons
      Six phases in order. Contain before eradicate, always.
      Scenario

      SOC analyst sees beaconing from a laptop. Which phase comes first — isolate the host, or wipe and rebuild it?

      Answer

      Containment (isolate). Stop the spread first. Eradication comes after you have scope, evidence, and a plan. Wiping before containing loses lateral-movement data.

      Exam tip: any IR question with “first” or “next step” almost always maps to containment after identification.
      MFA Categories
      Know · Have · Are · Where · Do
      MFA requires factors from different categories. Two from the same category is not MFA.
      Scenario

      A help-desk tool requires a password AND a security question. Does that satisfy MFA?

      Answer

      No. Both are something you know — same category. True MFA pairs knowledge (password) with possession (token, phone push) or biometric (fingerprint).

      Exam tip: password + PIN, password + security question, PIN + passphrase — all same category, all not MFA.
      Sanitization Ladder
      ClearPurgeDestroy
      NIST 800-88. Match method to media sensitivity — and to the media type.
      Scenario

      A hospital decommissions 800 SSDs that once held PHI. Is degaussing an appropriate Purge method?

      Answer

      No. Degaussing only works on magnetic media (HDDs, tapes). SSDs use flash — unaffected by magnetic fields. For SSDs: crypto-erase (if encrypted day one) or physical destruction per NIST 800-88.

      Exam tip: any SSD + degauss combo is a distractor. Memorize the media-to-method matrix.
      SIEM vs SOAR vs EDR
      SIEM correlates · SOAR automates · EDR watches endpoints
      Different jobs. Pick by what question needs answering.
      Scenario

      A SOC wants to auto-quarantine any endpoint that triggers a high-severity EDR alert and open a ticket. Which tool orchestrates that?

      Answer

      SOAR. SOAR consumes the alert, executes a playbook (quarantine via EDR API, open ticket, notify analyst). SIEM would correlate the alert; SOAR acts on it.

      Exam tip: “playbook,” “automated response,” “orchestration” → SOAR. “Correlation,” “search,” “dashboards” → SIEM.
      CVSS vs Risk
      CVSS = severity · Risk = severity × exposure × asset value × threat
      A 9.8 on an airgapped lab box is lower risk than a 7.5 on the customer portal under active exploit.
      Scenario

      Two vulns: CVSS 9.8 on an isolated internal dev VM; CVSS 7.5 on a public-facing login API that’s being actively exploited. Patch order?

      Answer

      Public-facing first. Risk, not raw CVSS, drives priority. The 7.5 has active exploitation on a crown-jewel asset — that’s the higher risk.

      Exam tip: exposure + active threat beats raw score. Look for words like “internet-facing,” “actively exploited,” “crown jewel.”
      Chain of Custody
      Legal holdAcquirePreserveDocument
      Forensically sound = reproducible, documented, and defensible in court.
      Scenario

      A compromised laptop is being held for forensic investigation. Counsel says litigation is likely. What notice should go out first?

      Answer

      Legal hold. Suspends normal retention/destruction for all potentially relevant data. Without it, routine deletion can destroy evidence and create spoliation exposure.

      Exam tip: any “litigation,” “e-discovery,” or “lawsuit anticipated” language → legal hold is almost always the right answer.

      The Forcing-Function Rule — Exam Strategy

      Domain 4 scenarios encode the answer in their constraints. Ask: what are the forcing functions? IR phase language drives the sequence. MFA-category language drives which factor choice is real. Sanitization questions test media type as much as method. CVSS + exposure + threat language drives risk priority. Read the clue words — don’t reach for the biggest-sounding tool.

      ↓ Download Flashcards (Anki-Compatible)
      05Think Like a SOC Lead

      Security+ Tests How You Run Security

      01
      Scenario

      The Beaconing Laptop

      At 02:10 the SIEM flags a corporate laptop opening periodic outbound HTTPS connections to a newly-registered domain. EDR shows a signed but uncommon process. The user is on vacation; the device is on a home Wi-Fi. What is the analyst’s next step?
      • ×
        Wipe and re-image the laptop immediatelyEradication before containment destroys evidence and may miss lateral-movement indicators. Wrong phase.
      • ✓
        Use EDR to isolate the endpoint, preserve memory / disk for forensics, then scope the incidentContainment first — stop the spread, keep the evidence, then investigate scope. Classic PICERL sequence.
      • ×
        Open a ticket and wait until the user returns from vacationWaiting on active beaconing allows data exfiltration and lateral movement. Timeliness matters in IR.
      • ×
        Block the domain at the firewall and close the alertBlocks the C2 channel only. The underlying implant can use fallback infrastructure; endpoint is still compromised.
      Principle: Contain before you eradicate. Isolate with EDR, preserve volatile data first (order of volatility), then scope and remediate.
      02
      Scenario

      The “MFA” That Wasn’t

      An internal audit finds that a customer portal requires users to enter a password and then answer a pre-set security question. The vendor markets the feature as “multi-factor authentication.” A compliance deadline for MFA is three weeks away. What is the accurate assessment and best next step?
      • ×
        Accept the vendor’s claim; both inputs are user-suppliedBoth are knowledge factors. MFA requires different categories.
      • ✓
        Flag as non-compliant; require a second-category factor (TOTP, push, FIDO2, or biometric) before the deadlineMFA requires factors from different categories: knowledge + possession, or knowledge + biometric. Password + security question is single-factor.
      • ×
        Add a second security question to strengthen the first factorThree knowledge factors are still one category. Does not satisfy MFA.
      • ×
        Send SMS OTPs only to users flagged as “high risk”Partial coverage does not meet a blanket MFA requirement; SMS is also a weaker possession factor than TOTP / push / FIDO2.
      Principle: MFA is defined by category diversity, not input count. Know / Have / Are / Where / Do — the factors must come from different categories.
      03
      Scenario

      The Vuln Prioritization Fight

      The weekly vulnerability report lists two findings. Finding A: CVSS 9.8 on a pre-production lab VM with no internet exposure and no sensitive data. Finding B: CVSS 7.5 on the customer-facing login API; a threat feed shows active exploitation in the wild targeting this CVE. Patching capacity this sprint covers one. Which do you patch first?
      • ×
        Patch Finding A first — higher CVSS scoreCVSS is technical severity. Exposure and active threat activity push Finding B to higher risk.
      • ✓
        Patch Finding B first; accept risk or compensate on A with network isolation and a tracking ticketRisk = severity × exposure × asset value × threat activity. Internet-facing + active exploit + revenue-critical API beats a higher score on an isolated lab asset.
      • ×
        Patch both this sprint by overloading the change windowChange capacity exists for operational safety; busting it invites incidents. The exam rewards prioritization under constraint.
      • ×
        File a risk exception on both and revisit next quarterExceptions are for accepted, compensated risk — not a default. Active exploitation is not exception territory.
      Principle: Patch by risk, not by raw CVSS. Exposure, asset value, and active threat activity turn a lower-scored vuln into a higher-priority fix.
      🎯

      Adaptive Domain 4 drills — Coming Soon

      TJS Platform will track your weak areas and generate focused Operations drills. AI Study Buddy will explain why you got it wrong.

      Coming Soon
      06Common Traps

      The Tempting Wrong Answer

      1

      Same-Category MFA

      Password + security question, password + PIN, PIN + passphrase — all know. Real MFA crosses categories: know + have, or know + are.

      2

      Eradication Before Containment

      Wiping an infected host before isolating destroys evidence and may hide lateral movement. Contain first, scope second, eradicate third.

      3

      SSD + Degaussing

      Degaussing only works on magnetic media. SSDs use flash — magnetic fields don’t affect them. For SSD: crypto-erase (if encrypted day one) or physical destruction.

      4

      CVSS = Risk

      CVSS is severity. Risk adds exposure, asset value, and active threat activity. A 9.8 on an isolated lab VM can be lower risk than a 7.5 on a crown-jewel API.

      5

      Delete ≠ Sanitize

      File deletion and formatting leave data recoverable with off-the-shelf tools. NIST 800-88 Clear / Purge / Destroy is the standard — match method to media sensitivity.

      6

      SIEM Automates Response

      SIEM correlates and alerts. SOAR executes the playbook (quarantine, ticket, enrich). Mixing the two is a common wrong-answer trap.

      7

      NetFlow ≠ PCAP

      NetFlow is metadata (who talked to whom, how much, when) — cheap, scalable. PCAP is the actual packets — expensive to store but the only source for payload analysis.

      8

      Standing Admin as Default

      Permanent admin for every engineer is the risk. Just-in-time elevation + PAM + ephemeral creds + session logging preserves response speed without the blast radius.

      07Self-Check Quiz

      6 Practice Questions

      Select an answer, then click Check. Full adaptive quiz engine with 200+ questions coming soon on TJS Platform.

      UnderstandBeginner4.1
      Q1. An organization wants a repeatable way to establish, deploy, and maintain a secure configuration for all Windows servers. Which combination BEST fits?
      • A A one-time manual hardening checklist run at build
      • B A documented baseline (e.g., CIS Benchmark) deployed via Group Policy / MDM with continuous drift monitoring
      • C Antivirus on every server with default settings
      • D Quarterly vulnerability scans with emailed reports
      Correct: B

      Secure baselines are documented (CIS / STIG), deployed at scale (GPO, MDM, config-mgmt tools), and continuously monitored for drift. Manual checklists don’t survive scale; AV and quarterly scans don’t define the baseline.

      Source: CompTIA SY0-701 Objectives v5.0 — 4.1
      ApplyIntermediate4.2
      Q2. A hospital is decommissioning 800 SSDs that held PHI. Which sanitization method is MOST appropriate if the drives were not encrypted at deployment?
      • A Degauss each drive
      • B Quick-format and reuse
      • C Crypto-erase by deleting the encryption key
      • D Physical destruction (shred or incinerate) per NIST 800-88 Destroy
      Correct: D

      Degaussing doesn’t affect flash. Crypto-erase requires day-one encryption — absent here. Quick-format leaves data recoverable. For unencrypted SSDs with sensitive data, Destroy is the defensible choice.

      Source: CompTIA SY0-701 Objectives v5.0 — 4.2; NIST SP 800-88 Rev. 1
      AnalyzeAdvanced4.3
      Q3. Two vulnerabilities compete for the same patch window. A: CVSS 9.8 on an isolated pre-production lab VM with no sensitive data. B: CVSS 7.5 on a customer-facing login API, actively exploited in the wild. Which is the HIGHER-priority fix?
      • A A, because raw CVSS is higher
      • B B, because risk factors in exposure, asset value, and active threat activity
      • C Neither; file exceptions and revisit
      • D Both are equal priority without more data
      Correct: B

      CVSS is technical severity. Risk = severity × exposure × asset value × threat activity. Internet-facing + active exploit + revenue-critical API beats an isolated lab asset with a higher raw score.

      Source: CompTIA SY0-701 Objectives v5.0 — 4.3
      ApplyIntermediate4.4
      Q4. A SOC wants alerts from multiple products to trigger a single playbook that isolates an endpoint, opens a ticket, and enriches the event with threat-intel. Which tool category fits?
      • A SIEM
      • B SOAR
      • C EDR
      • D NetFlow collector
      Correct: B

      SOAR consumes alerts (often from the SIEM) and runs playbooks that invoke EDR, ITSM, and threat-intel APIs. SIEM correlates and searches; EDR watches endpoints; NetFlow is metadata telemetry.

      Source: CompTIA SY0-701 Objectives v5.0 — 4.4 / 4.7
      UnderstandBeginner4.6
      Q5. Which pairing of authentication factors BEST satisfies multi-factor authentication?
      • A Password + security question
      • B Password + PIN
      • C Password + hardware security key (FIDO2)
      • D PIN + passphrase
      Correct: C

      MFA requires factors from different categories. Password (know) + FIDO2 key (have) crosses categories. A/B/D all pair two knowledge factors — single-factor, not MFA.

      Source: CompTIA SY0-701 Objectives v5.0 — 4.6
      AnalyzeAdvanced4.8
      Q6. SIEM flags a laptop beaconing to a newly-registered domain at 02:10. EDR shows a signed but uncommon process running. What should the analyst do FIRST?
      • A Wipe and re-image the laptop
      • B Isolate the endpoint via EDR and preserve volatile data for forensics
      • C Block the domain at the firewall and close the alert
      • D Open a low-priority ticket and wait for the user to return
      Correct: B

      Containment comes before eradication. Isolation stops further C2 and lateral movement; volatile data (memory, network state) must be captured before reboot or re-image per order of volatility.

      Source: CompTIA SY0-701 Objectives v5.0 — 4.8

      Continue Your Prep

      Choose how you want to study. All paths lead to the same goal — passing the Security+ on exam day.

      Pocket Reference PDF

      Printable desk reference with key concepts, mnemonics, and quick-reference tables for all 5 domains.

      $12 / one-time
      Get the PDF
      Free Domain 4 Cheat Sheet

      IR phases, MFA factor categories, NIST 800-88 media matrix, and SIEM vs SOAR vs EDR on one page.

      Free / email signup
      Download Free
      Disclaimer
      This content is provided for educational and exam preparation purposes only. It is designed to supplement your study efforts with additional context, scenarios, and practice material. This is not official CompTIA content, is not endorsed by CompTIA, and does not guarantee exam success. All practice questions are original and based on published exam objectives — they are not actual exam questions. Exam content, format, and policies are determined solely by CompTIA. Always refer to the official CompTIA Security+ SY0-701 Exam Objectives as your primary reference. Tech Jacks Solutions is not responsible for exam outcomes.

      CompTIA Security+ SY0-701 Exam Objectives · GAIO Integrity Lock Active · No brain dumps · No fabricated statistics