100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA CertMaster CE Security+ (SY0 601) Domain 2.0: Threats, Vulnerabilities, and Mitigations – 100-Question Practice Assessment (2026 Edition)

Rating
-
Sold
-
Pages
41
Grade
A+
Uploaded on
08-01-2026
Written in
2025/2026

The CompTIA CertMaster CE Security+ (SY0‑601) Domain 2.0: Threats, Vulnerabilities, and Mitigations – 100‑Question Practice Assessment (2026 Edition) is a self-paced online assessment for Security+ certified professionals aiming to renew their credential. It focuses on Domain 2.0, which includes identifying threat actors, attack vectors, vulnerabilities, indicators of malicious activity, and mitigation strategies. The assessment uses scenario-based and multiple-choice questions to test applied cybersecurity knowledge, ensuring learners can recognize and respond to real-world threats. Successful completion provides continuing education credit to maintain Security+ certification. Universities and academic institutions that incorporate Security+ preparation, including Domain 2 topics, include the University of Miami, University of Maryland Global Campus (UMGC), Western Governors University (WGU), and Excelsior College, often as part of their cybersecurity or information technology programs.

Show more Read less
Institution
CompTIA CertMaster CE Security+
Course
CompTIA CertMaster CE Security+











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA CertMaster CE Security+
Course
CompTIA CertMaster CE Security+

Document information

Uploaded on
January 8, 2026
Number of pages
41
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • ce security

Content preview

CompTIA CertMaster CE Security+ (SY0-
601) Domain 2.0: Threats, Vulnerabilities,
and Mitigations – 100-Question Practice
Assessment (2026 Edition)

Overview:
This comprehensive practice assessment contains 100 scenario-based, long-form questions
focused exclusively on Domain 2.0 – Threats, Vulnerabilities, and Mitigations, one of the
core domains of the CompTIA Security+ certification.

The assessment is designed to:

 Reflect realistic CompTIA-style exam questions, emphasizing critical thinking and
scenario analysis.
 Test knowledge of threat types, attack vectors, vulnerabilities, and mitigation
strategies, including social engineering, malware, attacks on web and network
infrastructure, and IoT/endpoint risks.
 Provide detailed answers and rationales for each question to enhance understanding
and reinforce learning.
 Serve as a self-study tool or pre-certification practice exam for individuals preparing
for the Security+ certification (SY0-601 or CertMaster CE updates).

Structure of the Assessment:

 Total Questions: 100
 Format: scenario-based multiple-choice
 Answer Format: Each question includes:
o Correct answer
o Detailed rationale explaining why it is correct
 Coverage: Includes but is not limited to:
o Malware types and mitigation
o Social engineering attacks (phishing, vishing, whaling)
o Vulnerabilities (SQL injection, XSS, RCE, directory traversal, IDOR)
o Network and endpoint security considerations
o IoT and cloud-specific security issues
o Attack detection, response, and preventive controls

,Section 1: Threat Types and Malware


Question 1:
A medium-sized company recently experienced an attack where several employees
reported that their workstations were behaving strangely. Files on the network appeared
encrypted, and a message demanded payment in cryptocurrency to restore access. The IT
team noted that the malware spread quickly to multiple systems, and some employees had
downloaded suspicious email attachments in the days prior.
Which type of malware is most likely responsible for this incident, and what is the best
immediate mitigation step to protect unaffected systems?
A) Worm; immediately disconnect affected systems from the network
B) Trojan; update antivirus software on all systems
C) Ransomware; restore from verified backups and isolate infected machines
D) Rootkit; reinstall operating systems on all machines
Answer: C) Ransomware; restore from verified backups and isolate infected machines
Rationale: 👀 ***: 👀 *** The scenario describes ransomware, as files are encrypted and a
ransom demand appears. The immediate mitigation is to isolate infected systems to
prevent spread and restore critical files from trusted backups, avoiding payment.


Question 2:
A new phishing campaign targets a company’s finance department. The emails appear to
come from the CFO, requesting urgent wire transfers. Several employees opened the email,
and a few clicked the link, entering their credentials. IT notices multiple failed logins across
the company and a sudden spike in network traffic to unknown external IPs.
Which combination of attack types is most likely occurring, and what preventive controls
could reduce the risk in the future?
A) Spear phishing and credential harvesting; implement employee security awareness
training and MFA
B) Whaling and malware injection; deploy antivirus only
C) Spam and adware; block email attachments
D) Trojan and rootkit; disconnect all computers from the network

,Answer: A) Spear phishing and credential harvesting; implement employee security
awareness training and MFA
Rationale: 👀 ***: The attack is spear phishing/whaling, targeting specific employees with
fake executive emails. Compromised credentials indicate credential harvesting. Mitigation
includes user training, phishing simulations, and multi-factor authentication.


Question 3:
An organization detects unusual outbound traffic from several employee workstations. Upon
investigation, it’s discovered that a small program is running silently in the background,
recording keystrokes and sending login credentials to an external server. The malware is
difficult to detect because it modifies system processes and hides in the OS kernel.
What type of malware is this, and which strategy is most effective for detection and
removal?
A) Rootkit; use specialized rootkit detection tools and reinstall the OS if necessary
B) Keylogger; instruct users to change passwords
C) Trojan; run antivirus software
D) Worm; patch vulnerabilities
Answer: A) Rootkit; use specialized rootkit detection tools and reinstall the OS if necessary
Rationale: 👀 ***: The malware hides in the kernel, indicating a rootkit. Rootkits are hard
to detect, so rootkit detection tools or OS reinstallation are often required.


Question 4:
During a security audit, a company notices that an old web application is still running on the
internal network. The application has not been updated for several years and contains
multiple known vulnerabilities. Penetration testers successfully exploit the system to gain
access to sensitive customer data.
Which type of vulnerability is primarily exploited here, and what is the recommended
mitigation strategy?
A) Software vulnerability; apply security patches and updates
B) Social engineering; train employees on phishing awareness
C) Misconfiguration; reset all passwords
D) Malware infection; install antivirus

, Answer: A) Software vulnerability; apply security patches and updates
Rationale: 👀 ***: Outdated applications with known vulnerabilities are common attack
vectors. The mitigation is timely patching, updating software, and applying secure
configurations.


Question 5:
A small office network experiences intermittent Denial-of-Service (DoS) attacks. IT notices
that multiple external IP addresses are sending large amounts of traffic to the web server,
causing it to slow down and become unresponsive. The company has firewalls, but they are
not configured to limit traffic rates.
Which attack is occurring, and what mitigation strategies should be implemented?
A) Distributed Denial-of-Service (DDoS); deploy rate-limiting, traffic filtering, and cloud-
based mitigation services
B) Virus; update antivirus
C) Trojan; disconnect all computers
D) Rootkit; reinstall OS
Answer: A) Distributed Denial-of-Service (DDoS); deploy rate-limiting, traffic filtering, and
cloud-based mitigation services
Rationale: 👀 ***: Multiple IPs flooding a network indicate a DDoS attack. Mitigation
involves network controls, filtering, and cloud services designed for DDoS protection.


Question 6:
Employees report receiving pop-up ads promoting fake antivirus software. After clicking
“Install,” their computers slow down, and some software stops working correctly. IT
discovers the system has installed multiple unwanted applications that monitor activity and
redirect web traffic.
What is the most likely type of malware, and which long-term mitigation strategy should
the company implement?
A) Adware; enforce endpoint protection policies and employee security awareness
B) Spyware; reinstall OS on all computers
C) Trojan; block all downloads
D) Worm; apply patches

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
studyguidepro NURSING
View profile
Follow You need to be logged in order to follow users or courses
Sold
68
Member since
4 months
Number of followers
4
Documents
1414
Last sold
2 hours ago
verified exams

Updated exams .Actual tests 100% verified.ATI,NURSING,PMHNP,TNCC,USMLE,ACLS,WGU AND ALL EXAMS guaranteed success.Here, you will find everything you need in NURSING EXAMS AND TESTBANKS.Contact us, to fetch it for you in minutes if we do not have it in this shop.BUY WITHOUT DOUBT!!!!Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied. **Ace Your Exams with Confidence!**

3.9

18 reviews

5
10
4
1
3
4
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions