Keep security terminology straight so scenario questions do not collapse into vague security language.
Security terminology questions are classification questions. CompTIA uses them to check whether you can keep the basic security language straight under pressure. If you confuse the weakness with the attack method or the risk with the control objective, you usually pick the wrong answer later in the scenario.
Exploit: A method or code path used to take advantage of a vulnerability.
CIA triad: Confidentiality, integrity, and availability, the three core security objectives used to describe what needs protection.
Vulnerability: A weakness that could be used by a threat or exploit path.
The strongest answers usually depend on whether you can separate:
| Term | What it means |
|---|---|
| threat | a possible danger, actor, event, or condition that could cause harm |
| vulnerability | a weakness that can be taken advantage of |
| exploit | the method used to take advantage of that weakness |
| risk | the potential for loss or harm when threats meet vulnerabilities |
| confidentiality | only authorized parties can access the information |
| integrity | data or systems remain accurate and trustworthy |
| availability | systems or data remain reachable when needed |
flowchart LR
A["Threat or attacker"] --> B["Vulnerability exists"]
B --> C["Exploit path is used"]
C --> D["Impact affects confidentiality, integrity, or availability"]
What to notice:
CIA helps you describe what was actually harmed or what the control is trying to protect1Weak admin password
2-> vulnerability
3Credential stuffing script
4-> exploit technique
5Unauthorized config change
6-> integrity impact
What to notice:
CIA lens to describe what is actually being harmedContinue with 4.5 Audits, Compliance & Data Locality to keep the domain flow intact.