100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CompTIA CertMaster CE Security+ (SY0 601) Domain 2.0: Threats, Vulnerabilities, and Mitigations – 100-Question Practice Assessment (2026 Edition)

Puntuación
-
Vendido
-
Páginas
41
Grado
A+
Subido en
08-01-2026
Escrito en
2025/2026

The CompTIA CertMaster CE Security+ (SY0‑601) Domain 2.0: Threats, Vulnerabilities, and Mitigations – 100‑Question Practice Assessment (2026 Edition) is a self-paced online assessment for Security+ certified professionals aiming to renew their credential. It focuses on Domain 2.0, which includes identifying threat actors, attack vectors, vulnerabilities, indicators of malicious activity, and mitigation strategies. The assessment uses scenario-based and multiple-choice questions to test applied cybersecurity knowledge, ensuring learners can recognize and respond to real-world threats. Successful completion provides continuing education credit to maintain Security+ certification. Universities and academic institutions that incorporate Security+ preparation, including Domain 2 topics, include the University of Miami, University of Maryland Global Campus (UMGC), Western Governors University (WGU), and Excelsior College, often as part of their cybersecurity or information technology programs.

Mostrar más Leer menos
Institución
CompTIA CertMaster CE Security+
Grado
CompTIA CertMaster CE Security+











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CompTIA CertMaster CE Security+
Grado
CompTIA CertMaster CE Security+

Información del documento

Subido en
8 de enero de 2026
Número de páginas
41
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CompTIA CertMaster CE Security+ (SY0-
601) Domain 2.0: Threats, Vulnerabilities,
and Mitigations – 100-Question Practice
Assessment (2026 Edition)

Overview:
This comprehensive practice assessment contains 100 scenario-based, long-form questions
focused exclusively on Domain 2.0 – Threats, Vulnerabilities, and Mitigations, one of the
core domains of the CompTIA Security+ certification.

The assessment is designed to:

 Reflect realistic CompTIA-style exam questions, emphasizing critical thinking and
scenario analysis.
 Test knowledge of threat types, attack vectors, vulnerabilities, and mitigation
strategies, including social engineering, malware, attacks on web and network
infrastructure, and IoT/endpoint risks.
 Provide detailed answers and rationales for each question to enhance understanding
and reinforce learning.
 Serve as a self-study tool or pre-certification practice exam for individuals preparing
for the Security+ certification (SY0-601 or CertMaster CE updates).

Structure of the Assessment:

 Total Questions: 100
 Format: scenario-based multiple-choice
 Answer Format: Each question includes:
o Correct answer
o Detailed rationale explaining why it is correct
 Coverage: Includes but is not limited to:
o Malware types and mitigation
o Social engineering attacks (phishing, vishing, whaling)
o Vulnerabilities (SQL injection, XSS, RCE, directory traversal, IDOR)
o Network and endpoint security considerations
o IoT and cloud-specific security issues
o Attack detection, response, and preventive controls

,Section 1: Threat Types and Malware


Question 1:
A medium-sized company recently experienced an attack where several employees
reported that their workstations were behaving strangely. Files on the network appeared
encrypted, and a message demanded payment in cryptocurrency to restore access. The IT
team noted that the malware spread quickly to multiple systems, and some employees had
downloaded suspicious email attachments in the days prior.
Which type of malware is most likely responsible for this incident, and what is the best
immediate mitigation step to protect unaffected systems?
A) Worm; immediately disconnect affected systems from the network
B) Trojan; update antivirus software on all systems
C) Ransomware; restore from verified backups and isolate infected machines
D) Rootkit; reinstall operating systems on all machines
Answer: C) Ransomware; restore from verified backups and isolate infected machines
Rationale: 👀 ***: 👀 *** The scenario describes ransomware, as files are encrypted and a
ransom demand appears. The immediate mitigation is to isolate infected systems to
prevent spread and restore critical files from trusted backups, avoiding payment.


Question 2:
A new phishing campaign targets a company’s finance department. The emails appear to
come from the CFO, requesting urgent wire transfers. Several employees opened the email,
and a few clicked the link, entering their credentials. IT notices multiple failed logins across
the company and a sudden spike in network traffic to unknown external IPs.
Which combination of attack types is most likely occurring, and what preventive controls
could reduce the risk in the future?
A) Spear phishing and credential harvesting; implement employee security awareness
training and MFA
B) Whaling and malware injection; deploy antivirus only
C) Spam and adware; block email attachments
D) Trojan and rootkit; disconnect all computers from the network

,Answer: A) Spear phishing and credential harvesting; implement employee security
awareness training and MFA
Rationale: 👀 ***: The attack is spear phishing/whaling, targeting specific employees with
fake executive emails. Compromised credentials indicate credential harvesting. Mitigation
includes user training, phishing simulations, and multi-factor authentication.


Question 3:
An organization detects unusual outbound traffic from several employee workstations. Upon
investigation, it’s discovered that a small program is running silently in the background,
recording keystrokes and sending login credentials to an external server. The malware is
difficult to detect because it modifies system processes and hides in the OS kernel.
What type of malware is this, and which strategy is most effective for detection and
removal?
A) Rootkit; use specialized rootkit detection tools and reinstall the OS if necessary
B) Keylogger; instruct users to change passwords
C) Trojan; run antivirus software
D) Worm; patch vulnerabilities
Answer: A) Rootkit; use specialized rootkit detection tools and reinstall the OS if necessary
Rationale: 👀 ***: The malware hides in the kernel, indicating a rootkit. Rootkits are hard
to detect, so rootkit detection tools or OS reinstallation are often required.


Question 4:
During a security audit, a company notices that an old web application is still running on the
internal network. The application has not been updated for several years and contains
multiple known vulnerabilities. Penetration testers successfully exploit the system to gain
access to sensitive customer data.
Which type of vulnerability is primarily exploited here, and what is the recommended
mitigation strategy?
A) Software vulnerability; apply security patches and updates
B) Social engineering; train employees on phishing awareness
C) Misconfiguration; reset all passwords
D) Malware infection; install antivirus

, Answer: A) Software vulnerability; apply security patches and updates
Rationale: 👀 ***: Outdated applications with known vulnerabilities are common attack
vectors. The mitigation is timely patching, updating software, and applying secure
configurations.


Question 5:
A small office network experiences intermittent Denial-of-Service (DoS) attacks. IT notices
that multiple external IP addresses are sending large amounts of traffic to the web server,
causing it to slow down and become unresponsive. The company has firewalls, but they are
not configured to limit traffic rates.
Which attack is occurring, and what mitigation strategies should be implemented?
A) Distributed Denial-of-Service (DDoS); deploy rate-limiting, traffic filtering, and cloud-
based mitigation services
B) Virus; update antivirus
C) Trojan; disconnect all computers
D) Rootkit; reinstall OS
Answer: A) Distributed Denial-of-Service (DDoS); deploy rate-limiting, traffic filtering, and
cloud-based mitigation services
Rationale: 👀 ***: Multiple IPs flooding a network indicate a DDoS attack. Mitigation
involves network controls, filtering, and cloud services designed for DDoS protection.


Question 6:
Employees report receiving pop-up ads promoting fake antivirus software. After clicking
“Install,” their computers slow down, and some software stops working correctly. IT
discovers the system has installed multiple unwanted applications that monitor activity and
redirect web traffic.
What is the most likely type of malware, and which long-term mitigation strategy should
the company implement?
A) Adware; enforce endpoint protection policies and employee security awareness
B) Spyware; reinstall OS on all computers
C) Trojan; block all downloads
D) Worm; apply patches
$28.50
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
studyguidepro NURSING
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
68
Miembro desde
4 meses
Número de seguidores
4
Documentos
1414
Última venta
3 horas hace
verified exams

Updated exams .Actual tests 100% verified.ATI,NURSING,PMHNP,TNCC,USMLE,ACLS,WGU AND ALL EXAMS guaranteed success.Here, you will find everything you need in NURSING EXAMS AND TESTBANKS.Contact us, to fetch it for you in minutes if we do not have it in this shop.BUY WITHOUT DOUBT!!!!Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied. **Ace Your Exams with Confidence!**

3.9

18 reseñas

5
10
4
1
3
4
2
1
1
2

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes