Domain 222% of exam

Security+ Domain 2: Threats, Vulnerabilities, and Mitigations

Security+ Domain 2 is the largest technical domain, covering threat actors, attack vectors, vulnerability types, and mitigation strategies. Expect heavy scenario-based questions requiring you to identify attacks from indicators and recommend appropriate countermeasures.

Questions

~19-20 questions

Concepts

38 total

Difficulty

Intermediate

Study Time

2-3 weeks

Objectives

5 objectives

Overview

Threats, Vulnerabilities, and Mitigations represents the technical heart of the Security+ exam. At 22% of the exam weight, this domain tests your ability to think like both an attacker and a defender. You'll need to recognize attack patterns, understand why vulnerabilities exist, and prescribe the right mitigations. This domain has evolved significantly in SY0-701 to reflect the modern threat landscape. You'll encounter questions about AI-powered attacks, supply chain compromises, cloud-specific vulnerabilities, and advanced persistent threats. The exam expects you to understand not just what attacks exist, but how to identify them from indicators and logs. Scenario questions dominate this domain. You might see a log excerpt and need to identify the attack type, or receive a description of suspicious behavior and determine the threat actor category. The key is pattern recognition—understanding the signatures and behaviors that distinguish different attack types. Success in Domain 2 requires both breadth and depth. You need broad knowledge of many attack types while also deeply understanding how major attacks work, what indicators they leave, and how to mitigate them. Focus especially on social engineering, malware analysis, and network-based attacks.

Key Topics

Threat Actors & MotivationsSocial Engineering AttacksMalware Types & AnalysisApplication VulnerabilitiesNetwork AttacksIndicator AnalysisAttack MitigationSupply Chain Security

Exam Objectives

2.1High

Compare and contrast common threat actors and motivations

Understanding who attacks systems and why.

Key Concepts

Threat Actor Types

Categories of adversaries including nation-states, unskilled attackers (script kiddies), hacktivists, insider threats, organized crime, and shadow IT.

Threat Actor Attributes

Characteristics that differentiate threat actors: internal vs external, resources/funding levels, and sophistication/capability levels.

Threat Actor Motivations

Understanding why actors attack: data exfiltration, espionage, service disruption, blackmail, financial gain, philosophical beliefs, revenge, chaos, and warfare.

Exam Tip

Match threat actors to their typical motivations: nation-states (espionage, disruption), organized crime (money), hacktivists (ideology), insiders (revenge, financial gain). Understand the resource levels and sophistication of each.

2.2Critical

Explain common threat vectors and attack surfaces

Understanding how attackers gain access to systems.

Key Concepts

Message-Based Vectors

Attack delivery through communication channels including email, SMS, and instant messaging. Understanding how malicious content is distributed.

File and Media Vectors

Attacks delivered through files, images, voice calls, and removable devices. Understanding malicious payloads in various media types.

Vulnerable Software

Attack surface created by software vulnerabilities. Understanding client-based vs agentless software risks and unsupported systems.

Network-Based Attack Surface

Vulnerabilities in network infrastructure including unsecure wireless, wired, and Bluetooth networks. Open ports and default credentials.

Supply Chain Vectors

Attacks through trusted third parties including MSPs, vendors, and suppliers. Understanding supply chain compromise risks.

Social Engineering Techniques

Human-focused attack methods including phishing, vishing, smishing, pretexting, impersonation, and business email compromise.

Advanced Social Engineering

Sophisticated social attacks including watering hole attacks, brand impersonation, typosquatting, and misinformation/disinformation campaigns.

Exam Tip

Social engineering vectors are heavily tested. Know the differences between phishing variants and how to identify each type from a scenario description.

2.3High

Explain various types of vulnerabilities

Understanding weaknesses that attackers exploit.

Key Concepts

Application Vulnerabilities

Software flaws including memory injection, buffer overflow, and race conditions (TOC/TOU). Understanding how application code can be exploited.

Web Application Vulnerabilities

Common web-specific vulnerabilities including SQL injection and cross-site scripting (XSS). Understanding input validation failures.

Operating System Vulnerabilities

OS-level security weaknesses including kernel vulnerabilities, privilege escalation paths, and system misconfigurations.

Hardware and Firmware Vulnerabilities

Physical device weaknesses including firmware vulnerabilities, end-of-life hardware, and legacy system risks.

Virtualization Vulnerabilities

Risks specific to virtual environments including VM escape and resource reuse vulnerabilities.

Cloud-Specific Vulnerabilities

Security weaknesses unique to cloud environments including misconfigured storage, insecure APIs, and shared responsibility gaps.

Supply Chain Vulnerabilities

Weaknesses introduced through service providers, hardware providers, and software providers in the supply chain.

Cryptographic Vulnerabilities

Weaknesses in cryptographic implementations including weak algorithms, poor key management, and implementation flaws.

Misconfiguration Vulnerabilities

Security weaknesses from improper system configuration including default settings, excessive permissions, and exposed services.

Mobile Device Vulnerabilities

Mobile-specific risks including side loading, jailbreaking, and mobile malware. Understanding mobile attack surfaces.

Zero-Day Vulnerabilities

Previously unknown vulnerabilities with no available patches. Understanding zero-day discovery, disclosure, and mitigation challenges.

Exam Tip

Focus on web application vulnerabilities (SQL injection, XSS, CSRF) and cloud misconfigurations—these are heavily tested. Know what each vulnerability looks like and how it's exploited.

2.4Critical

Given a scenario, analyze indicators of malicious activity

Identifying attacks from logs, behavior, and other indicators.

Key Concepts

Malware Types and Indicators

Recognizing different malware categories: ransomware, trojans, worms, spyware, viruses, keyloggers, logic bombs, rootkits, and bloatware.

Physical Attack Indicators

Signs of physical security breaches including brute force entry, RFID cloning, and environmental attacks.

Network Attack Indicators

Recognizing network-based attacks including DDoS (amplified/reflected), DNS attacks, wireless attacks, on-path attacks, and credential replay.

Application Attack Indicators

Signs of application-level attacks including injection, buffer overflow, replay, privilege escalation, forgery, and directory traversal.

Cryptographic Attack Indicators

Recognizing attacks on cryptographic systems including downgrade attacks, collision attacks, and birthday attacks.

Password Attack Indicators

Signs of password-focused attacks including password spraying and brute force attempts.

Behavioral Indicators of Compromise

Recognizing anomalous activity: account lockouts, concurrent sessions, blocked content, impossible travel, resource issues, and logging anomalies.

Exam Tip

This is a PBQ-heavy objective. Practice reading log excerpts and identifying attack patterns. Know the difference between IoC (after breach) and IoA (during attack).

2.5High

Explain the purpose of mitigation techniques used to secure the enterprise

Countermeasures to prevent, detect, or respond to attacks.

Key Concepts

Network Segmentation

Dividing networks into isolated segments to contain breaches and limit lateral movement. Understanding VLANs, subnets, and network boundaries.

Access Control Implementation

Using ACLs and permissions to restrict access to resources. Implementing principle of least privilege.

Application Allow Listing

Restricting which applications can execute to prevent unauthorized software. Whitelisting approaches and implementation.

Isolation Techniques

Separating systems and processes to prevent compromise spread. Sandboxing, air gaps, and logical isolation methods.

Patching and Updates

Keeping systems current with security patches. Patch management processes, testing, and deployment strategies.

Encryption for Mitigation

Using encryption to protect data confidentiality and integrity as a mitigation control.

Security Monitoring

Continuous observation of systems and networks to detect threats. SIEM, log analysis, and alerting.

Configuration Enforcement

Ensuring systems maintain secure configurations. Configuration management, baselines, and compliance checking.

Decommissioning

Securely retiring systems and data. Data sanitization, secure disposal, and asset lifecycle management.

System Hardening

Reducing attack surface through secure configuration. Disabling unnecessary services, changing defaults, removing unnecessary software, implementing host-based protections.

Exam Tip

For every attack type, know the corresponding mitigation. Scenarios will describe an attack and ask for the best countermeasure—match threats to mitigations.

Common Mistakes to Avoid

  • Confusing phishing, smishing, vishing, and whaling
  • Not understanding the difference between viruses, worms, and trojans
  • Mixing up SQL injection and XSS attack mechanisms
  • Forgetting that insiders can be the most dangerous threat actors
  • Not recognizing supply chain attack patterns

PBQ Practice Areas

Performance-based questions (PBQs) for this domain typically cover:

Analyzing log files to identify attack types
Matching threat actors to scenarios based on motivations
Identifying malware types from behavior descriptions
Selecting appropriate mitigations for given threats
Classifying vulnerability types from descriptions

Frequently Asked Questions

How do I study for indicator analysis questions?

Practice reading logs and identifying patterns. Look for unusual login times, failed authentication attempts, unexpected outbound connections, and suspicious process activity. Build a mental library of what "normal" vs "abnormal" looks like.

Do I need to memorize all malware types?

Focus on the main categories: viruses (need host file), worms (self-replicating), trojans (disguised), ransomware (encryption/extortion), rootkits (hide presence), keyloggers (capture input), RATs (remote access), and spyware (surveillance). Know how each behaves and spreads.

What's the difference between vulnerability and threat?

A vulnerability is a weakness that could be exploited. A threat is something that could exploit a vulnerability. A threat actor is who exploits it. Risk = Threat × Vulnerability × Impact. All three concepts work together.

How important are APTs for the exam?

APTs are tested as the most sophisticated threat actor category. Understand they use multiple attack vectors, maintain long-term persistence, often involve nation-states, and require defense-in-depth strategies to counter.

Study Strategy

Focus on recognizing attack patterns and matching them to mitigations. Use flashcards for malware types and social engineering variants. Practice with log analysis scenarios.

Master this domain

Get personalized practice questions and track your progress.

99% of students who reach 95% concept mastery pass

Start Free Assessment

Domain Stats

Exam Weight22%
Questions~19-20
Concepts38
Study Time2-3 weeks
DifficultyIntermediate

Ready to master Security+ Domain 2: Threats, Vulnerabilities, and Mitigations?

Our adaptive learning system identifies your weak spots and creates a personalized study plan.

99% of students who reach 95% concept mastery pass the exam