SecurityA+

Security Threats for CompTIA A+ 220-1102

Security threats are a major focus of CompTIA A+ 220-1102. A+ technicians must identify malware types, social engineering attacks, and non-malware threats to protect users and systems. This guide covers every security threat in the A+ Core 2 objectives with real-world examples and exam-ready definitions.

12
6 sections · 8 exam key points
2 practice questions

Malware Types

Virus: malicious code that attaches to a legitimate program and replicates when the host program runs. Requires user action to spread (running an infected file, opening an email attachment). Worm: self-replicating malware that spreads across networks without user action — exploits OS or application vulnerabilities. Trojan horse: malware disguised as legitimate software. Does not self-replicate. Creates a backdoor or performs malicious actions when executed. Ransomware: encrypts user files and demands payment for the decryption key. Spreads via phishing email, drive-by download, or RDP brute force. Spyware: secretly monitors user activity. Keyloggers: record keystrokes to steal passwords and credit card numbers. Adware: displays unwanted advertisements; often bundled with free software. Rootkit: hides malware by modifying the OS at a low level. Extremely difficult to detect and remove — may require offline scanning or OS reinstallation. Fileless malware: runs in memory without writing files to disk. Uses legitimate OS tools (PowerShell, WMI) for malicious purposes — evades signature-based antivirus.

Social Engineering Attacks

Social engineering manipulates people rather than exploiting technology. Phishing: fraudulent emails impersonating legitimate organizations to steal credentials or deliver malware. Spear phishing: targeted phishing aimed at specific individuals using personalized information. Whaling: spear phishing targeting executives or high-value individuals. Vishing: voice phishing — phone calls impersonating IT support, banks, or government agencies. Smishing: SMS phishing — text messages with malicious links. Tailgating / piggybacking: following an authorized person through a secured door without using credentials. Shoulder surfing: observing someone's screen or keyboard to steal credentials. Dumpster diving: searching physical trash for sensitive information (passwords written on paper, discarded documents). Impersonation: pretending to be someone else (IT support, executive, vendor) to gain access. Pretexting: creating a fabricated scenario to manipulate the target.

Network-Based Threats

Man-in-the-Middle (MitM) attack: attacker intercepts communication between two parties. Used for credential theft, session hijacking, or data modification. ARP poisoning: sends fake ARP replies to redirect traffic through the attacker's machine (Layer 2 MitM). DNS poisoning: corrupts DNS cache to redirect users to fake websites. On-path attack: modern term for MitM. Evil twin / rogue access point: fake Wi-Fi network with a legitimate-sounding SSID. Users connect thinking it's the real network; attacker intercepts traffic. DoS (Denial of Service): floods a target with traffic to make it unavailable. DDoS (Distributed DoS): DoS from multiple compromised systems (botnet). SQL injection: malicious SQL code inserted into input fields to manipulate database queries. Cross-site scripting (XSS): malicious scripts injected into trusted websites. Replay attack: captured authentication traffic replayed to gain unauthorized access.

Password Attacks

Brute force: systematically trying every possible password combination. Slow but guaranteed to succeed given enough time. Dictionary attack: tries common words, phrases, and known password variations. Much faster than brute force. Rainbow table attack: uses pre-computed hash-to-password tables to reverse password hashes quickly. Credential stuffing: uses stolen username/password pairs from one breach to try on other services — works because users reuse passwords. Password spraying: tries one common password (e.g., 'Password1') against many accounts to avoid lockout. Countermeasures: long passwords (15+ characters), complexity requirements, multi-factor authentication, account lockout policies, password managers, salted password hashes (defeats rainbow table attacks).

Physical Security Threats

Unauthorized physical access: most security controls fail if an attacker has physical access to hardware. Theft: laptops, hard drives, phones, network equipment. Hardware keyloggers: USB or PS/2 devices plugged between keyboard and computer to capture keystrokes — invisible to software. Evil maid attack: attacker with physical access modifies hardware or installs malware while the device is unattended. Skimming: card readers placed over ATM or payment terminals to capture card data. Shoulder surfing: viewing screen content in public places. Physical destruction: servers, networking equipment damaged by disgruntled insiders or criminals. Countermeasures: cable locks, equipment cages, security cameras, access controls (badges, PINs), screen privacy filters, full-disk encryption (protects data if device is stolen).

Zero-Day and Insider Threats

Zero-day vulnerability: security flaw that is unknown to the vendor and has no patch available. Zero-day exploit: attack that targets a zero-day vulnerability. Extremely dangerous because there is no defense other than detection and response. Advanced Persistent Threat (APT): sophisticated, long-term attack campaign often sponsored by nation-states or organized crime. Goal: persistent access to steal data over months or years rather than quick destruction. Insider threat: current or former employee, contractor, or business partner who misuses authorized access. Types: malicious insider (intentional), negligent insider (accidental), compromised insider (credentials stolen). Mitigation: principle of least privilege, separation of duties, user activity monitoring, offboarding procedures.

Key exam facts — A+

  • Virus requires host program + user action to spread; worm spreads without user action
  • Ransomware encrypts files and demands payment — restore from backup, don't pay
  • Phishing = email; vishing = voice; smishing = SMS
  • Tailgating: physical security breach — following someone through a secured door
  • Evil twin: rogue Wi-Fi AP with legitimate-sounding SSID — captures credentials
  • Password spraying: one password tried against many accounts — avoids lockout
  • Rootkit: hides in OS — requires offline scan or reinstallation to remove
  • Zero-day: unknown to vendor, no patch available at time of attack

Common exam traps

Practice questions — Security Threats

These questions are representative of what you will see on A+ exams. The correct answer and explanation are shown immediately below each question.

Q1.

A.A. Phishing
B.B. Vishing
C.C. Smishing
D.D. Tailgating

Explanation: Vishing (voice phishing) uses phone calls to manipulate victims into revealing credentials. IT support should never ask for a user's password over the phone.

Q2.

A.A. Trojan horse
B.B. Adware
C.C. Ransomware
D.D. Rootkit

Explanation: Rootkits modify the operating system to hide their presence. They operate at a low level and are extremely difficult to detect with normal tools. Offline scanning or OS reinstallation is often required for complete removal.

Frequently asked questions — Security Threats

What is the difference between a virus and a worm?

A virus attaches to an existing program and requires that program to run and user action to spread (opening an infected file, running an attachment). A worm is self-contained and replicates across networks automatically by exploiting vulnerabilities — no user action required. Worms can spread much faster than viruses.

Practice this topic

Test yourself on Security Threats

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics