Recognize malware, password, application, physical, network, and cryptographic attacks well enough to separate them in Security+ scenarios.
Security+ uses malicious-activity questions to check whether you can identify what the attacker is doing right now. That sounds basic, but it is easy to confuse a password attack with a phishing vector, or a cryptographic downgrade issue with a generic network attack. The exam rewards precise classification because response priorities change with the attack type.
Credential stuffing: Reusing usernames and passwords stolen from another breach against a new service.
Password spraying: Trying one or a few common passwords across many accounts to avoid lockouts.
RAT: Remote access trojan, malware that gives the attacker hidden control over a victim system.
CompTIA is usually checking whether you can:
| Attack family | Examples |
|---|---|
| Malware | ransomware, trojan, worm, RAT, rootkit, logic bomb |
| Password attacks | brute force, password spraying, credential stuffing, keylogging |
| Application attacks | SQL injection, XSS, CSRF, SSRF, command injection |
| Physical attacks | tailgating, badge cloning, hardware tampering, shoulder surfing |
| Network attacks | DNS poisoning, ARP poisoning, DoS, on-path interception |
| Cryptographic attacks | downgrade attack, weak key use, collision abuse, birthday-style attacks |
| Pattern | Strongest first label |
|---|---|
| Same password tried across many users | Password spraying |
| Stolen credentials reused from another breach | Credential stuffing |
| Malicious script delivered to another user’s browser | XSS |
| Database query manipulated through input | SQL injection |
| Traffic integrity or trust weakened by forced fallback | Downgrade or cryptographic attack |
| Encryption and extortion pressure on business systems | Ransomware |
Security+ often presents these as similar-looking answer choices. The clue is usually the pattern of attempts and the source of the credentials.
If you misclassify the activity, you can still miss the best next step:
12026-03-28T14:10:01Z auth-fail user=ajones src=203.0.113.10
22026-03-28T14:10:03Z auth-fail user=mbrown src=203.0.113.10
32026-03-28T14:10:05Z auth-fail user=rwong src=203.0.113.10
What to notice:
A public login portal shows thousands of failed sign-ins from one IP, each against a different employee username, all using the same seasonal password guess. Which classification is strongest?
A. Credential stuffing B. Password spraying C. SQL injection D. Tailgating
Best answer: B. The behavior is one password across many accounts, which is the defining pattern of password spraying.
Continue with 2.5 Mitigation Techniques to connect attack recognition to the controls that actually reduce the risk.