Understand how Security+ distinguishes insider, criminal, hacktivist, nation-state, shadow IT, and other actor motives in scenario questions.
Security+ uses threat-actor questions to test judgment, not just label recall. The exam wants you to identify who is most likely behind an action, what they probably want, and how that changes the defensive response. If you confuse motive with technique, you will often choose the wrong next step.
CompTIA is usually checking whether you can:
| Actor | Typical motive | Usual signal in a scenario |
|---|---|---|
| Nation-state or APT | espionage, disruption, long-term access | stealth, persistence, high-value targets, patience |
| Organized crime | money, extortion, fraud | ransomware, business email compromise, theft |
| Hacktivist | ideology, publicity, disruption | defacement, public campaigns, high-visibility targets |
| Insider threat | revenge, negligence, profit, coercion | legitimate access misused or mishandled |
| Script kiddie or unskilled attacker | curiosity, bragging rights, easy disruption | commodity tools, noisy activity |
| Shadow IT | convenience rather than attack intent | unmanaged tools or services outside policy |
| Likely actor | Strongest immediate concern |
|---|---|
| Nation-state or APT | persistence, stealth, data exfiltration, broad investigation scope |
| Organized crime | monetization path, ransomware resilience, fraud controls |
| Hacktivist | public-facing disruption, defacement, reputational visibility |
| Insider | least privilege, auditing, separation of duties, behavioral context |
| Shadow IT | governance gap, unmanaged data movement, unsanctioned exposure |
Different motives change defensive priorities:
If an employee with valid access exports unusually large volumes of sensitive data right before resignation, Security+ is usually testing whether you see insider risk and accountability controls, not whether you can name a malware family.
CompTIA includes shadow IT because unmanaged technology creates real risk even when there is no malicious intent. A department using an unsanctioned SaaS app to move sensitive data may create the same exposure path that an attacker later exploits.
A company discovers slow, careful data theft from a research environment. The attacker used valid credentials, avoided noisy scanning, and stayed active for months. Which response focus is strongest first?
A. Treat it like an ordinary prank and reset one user password B. Assume a potentially persistent, high-capability intrusion and expand investigation scope around access, dwell time, and data exposure C. Focus only on replacing end-user keyboards D. Disable all logging so the attacker cannot study system output
Best answer: B. The scenario points toward a stealthy, high-capability actor and requires broader investigation discipline than a one-off noisy intrusion.
Continue with 2.2 Threat Vectors & Attack Surfaces to separate actor intent from the path used to reach the target.