Domain 1: General Security Concepts
The foundation of cybersecurity. Master the controls, concepts, and cryptographic tools that every security professional must know.
Six Ideas That Drive Every Question
These concepts appear across almost every Domain 1 question. Know them cold.
Security Controls
4 categories × 6 types = the exam's favorite matrix
"A warning sign is NOT preventive — it's deterrent. A firewall IS preventive. The exam tests whether you know the difference."
Deep dive in 1.1 Security Controls →CIA Triad
The 3 objectives every control maps back to
"Every firewall rule exists to serve one of these three. If it doesn't map to C, I, or A — why is it there?"
Deep dive in 1.2 Fundamental Concepts →Zero Trust
Never trust, always verify — Control Plane + Data Plane
"Your VPN user authenticated once and has full network access? That's the opposite of Zero Trust."
Deep dive in 1.2 Fundamental Concepts →AAA
Authentication proves who, Authorization proves what, Accounting proves when
"A user logs in (authentication), accesses the finance share (authorization), and it's all logged (accounting)."
Deep dive in 1.2 Fundamental Concepts →Change Management
Every unmanaged change is a potential vulnerability
"A sysadmin pushes a patch without a backout plan. The patch breaks production. Now what?"
Deep dive in 1.3 Change Management →Cryptography
Symmetric for speed, asymmetric for trust, hashing for proof
"You encrypted the password database with AES-256. Great — but passwords should be hashed, not encrypted. Encryption is reversible."
Deep dive in 1.4 Cryptographic Solutions →Find Out Where to Start
5 questions across Domain 1 — see which objectives need the most work.
Focus on these objectives
You've got these
4 Objectives — Pick Your Path
Each lesson teaches through real scenarios — concept, textbook, hard choice, exam signal. Start anywhere or go in order. Completed lessons show a checkmark.
Compare and contrast categories (Technical, Managerial, Operational, Physical) and types (Preventive, Deterrent, Detective, Corrective, Compensating, Directive)
CIA, Non-repudiation, AAA, Zero Trust, Physical Security, Deception Technology
Business processes, technical implications, documentation, version control
PKI, encryption, tools (TPM/HSM), obfuscation, hashing, certificates
Hands-on labs and adaptive quizzes — Coming Soon
TJS Platform will have scenario-based drills, matching exercises, and AI-powered explanations for every objective.
Learn It, Test It, Lock It In
Each card has 3 layers. Click to advance: mnemonic → scenario challenge → answer + exam tip.
A biometric lock on a server room door — what CATEGORY and TYPE?
Technical + Preventive. The biometric scanner is an electronic/software mechanism (Technical category) that prevents unauthorized entry (Preventive type). The door itself is Physical, but the biometric authentication component makes this a Technical control.
Data was modified in transit without detection. Which pillar was violated?
Integrity. Modification = integrity. Disclosure = confidentiality. Downtime = availability.
Which plane contains the Policy Enforcement Point?
Data Plane. The Control Plane (Policy Engine + Policy Administrator) makes the decision. The Data Plane (Policy Enforcement Point) carries it out.
A fake credential planted in a database that alerts when used?
Honeytoken. Pot = system, net = network, file = document, token = data. A planted credential is data, so it's a honeytoken.
A zero-day drops. Can you skip change management?
No — even emergency changes need a backout plan. The process can be accelerated (emergency CAB, expedited approval) but never bypassed entirely.
AES-256 uses how many keys?
One — it's symmetric. AES (Advanced Encryption Standard) uses a single shared key. Fast for bulk data. Asymmetric (RSA, ECC) uses a key pair but is slower.
The Elimination Rule — Exam Strategy
Eliminate 2 obviously wrong answers. Between the remaining 2, choose the one that is more specific, more technical, or more directly addresses the scenario. Security+ rewards precision over generality.
Security+ Tests How You Solve Problems
Server Room Breach
- ×Add more camerasDetective only — doesn't prevent the next breach
- ×Fire the employee who held the doorCorrective, but doesn't address the root cause
- ✓Anti-tailgating mantrap (preventive) + security awareness training (directive)Layered defense: physical prevention + behavioral change addresses root cause.
- ×Post a "No Tailgating" signDeterrent only — signs don't stop determined intruders
Patch Emergency
- ×Deploy the patch immediatelySkips change management entirely
- ×Wait for the next maintenance windowActive exploitation means urgency matters
- ✓Initiate emergency change management with a backout planFast-track the process, but never skip it. A backout plan ensures recoverability.
- ×Isolate the servers from the networkCompensating control, but doesn't fix the vulnerability
Password Breach
- ×Use a stronger encryption algorithmAES-256 is already strong — wrong tool, not weak tool
- ×Encrypt the encryption keyKey management helps but doesn't fix the fundamental flaw
- ✓Hash passwords with bcrypt/Argon2 + unique salt per passwordHashing is one-way — even with the database, passwords can't be reversed. Salting prevents rainbow tables.
- ×Implement MFA so passwords don't matterDefense in depth, but passwords should still be properly stored
Adaptive practice drills — Coming Soon
TJS Platform will track your weak areas and generate focused drills. AI Study Buddy will explain why you got it wrong.
The Tempting Wrong Answer
Deterrent vs Preventive
A sign discourages (deterrent). A lock prevents (preventive). Both are physical, but different types.
Honeypot vs Honeytoken
Honeypot = fake system. Honeytoken = fake data. The exam tests this distinction by scale.
Authentication vs Authorization
Authentication = who you are. Authorization = what you can do. Logging in vs accessing a resource.
Encryption vs Hashing
Encryption is reversible (with the key). Hashing is one-way. Passwords get hashed, not encrypted.
TPM vs HSM
TPM = endpoint chip (built into motherboard). HSM = enterprise appliance (dedicated hardware for key management).
Symmetric vs Asymmetric
Symmetric = speed (one key, bulk data). Asymmetric = trust (two keys, key exchange, signatures).
5 Practice Questions
Select an answer, then click Check. Full adaptive quiz engine with 200+ questions coming soon on TJS Platform.
- A Technical / Preventive
- B Operational / Preventive
- C Physical / Detective
- D Managerial / Directive
A security guard depends on a human performing an action (Operational category) and actively prevents unauthorized entry by checking badges (Preventive type). A locked door would be Physical; the guard is Operational because it requires human judgment.
- A Policy Enforcement Point
- B Policy Engine
- C Policy Administrator
- D Identity Provider
The Policy Engine evaluates requests and makes the allow/deny decision. The PEP enforces it. The Policy Administrator communicates the decision to the PEP.
- A Insufficient testing infrastructure
- B Bypassing change management process
- C Lack of weekend monitoring
- D Missing rollback automation
The root failure is bypassing change management. Proper CM would have required impact analysis, approval, and a backout plan before any production change.
- A Key stretching
- B Salting
- C Peppering
- D Steganography
Salting adds unique random data to each password before hashing. This ensures identical passwords produce different hashes, defeating precomputed rainbow tables.
- A Honeypot
- B Honeynet
- C Honeytoken
- D Honeyfile
A honeytoken is a piece of fake data (credential, record, API key) planted to detect unauthorized access. Honeypots are systems, honeynets are networks, honeyfiles are documents.
Continue Your Prep
Choose how you want to study. All paths lead to the same goal — passing the Security+ on exam day.
All 5 domains, 200+ adaptive questions, AI Study Buddy, timed exams, and certificate of completion.
Printable desk reference with key concepts, mnemonics, and quick-reference tables for all 5 domains.
Domain 1 key concepts on one page. Control matrix, CIA mapping, crypto basics, and the traps you need to know.
Stay Current on Certifications
Get updates when salary data, exam changes, or new cert guides are published.