Map attacker motives, attack paths, vulnerabilities, malicious activity, and defensive responses for the heaviest early Security+ scenario set.
This chapter is where Security+ starts feeling like real incident and defensive reasoning instead of term review. The exam wants you to separate attacker motive from attack vector, vector from vulnerability, and vulnerability from mitigation. Weak answers usually skip one of those layers and jump to a generic “security product” response.
Attack vector: The path or method the attacker uses to reach the target, such as phishing, exposed services, or a supply-chain channel.
Blast radius: The amount of system, data, or business impact a successful attack can reach before it is contained.
IOC: Indicator of compromise, a clue such as a suspicious hash, IP, process, or login event that suggests malicious activity has already occurred.
CompTIA currently weights this domain at 22%. It is one of the larger domains and it cross-connects heavily with architecture and operations.
Start with 2.1 Threat Actors & Motivations, then move through 2.2 Threat Vectors & Attack Surfaces, 2.3 Vulnerabilities, 2.4 Malicious Activity, and 2.5 Mitigation Techniques.
| If the scenario is really about… | Go first to… |
|---|---|
| attacker intent, insider risk, organized crime, or nation-state behavior | 2.1 Threat Actors & Motivations |
| phishing, social engineering, exposed services, weak wireless, or supply-chain entry paths | 2.2 Threat Vectors & Attack Surfaces |
| unpatched software, cloud misconfigurations, mobile or virtualization weaknesses | 2.3 Vulnerabilities |
| ransomware, password attacks, network abuse, or application exploitation | 2.4 Malicious Activity |
| segmentation, hardening, isolation, access control, or patching choices | 2.5 Mitigation Techniques |
Threat analysis rarely stays inside one chapter on Security+:
If your misses are mostly “I knew the term but chose the wrong control,” this is usually the domain to revisit first.
If you keep missing social-engineering, web, or ransomware questions, do not just reread the cheat sheet. Rework the related lesson pages and log which layer you misidentified.