CompTIA A+ Security Threats & Tools Study Guide
Overview
This study guide covers the essential security concepts tested on the CompTIA A+ exam, including malware classifications, common attack vectors, social engineering tactics, and defensive tools and best practices. Understanding how threats work — and how to counter them — is critical for any IT support professional. Mastery of these topics demonstrates your ability to identify, respond to, and prevent security incidents in real-world environments.
---
Malware Types
Summary
Malware (malicious software) refers to any program designed to damage, disrupt, or gain unauthorized access to systems. Each type has a distinct mechanism of action, and the exam frequently tests your ability to distinguish between them based on behavioral characteristics.
Key Malware Types
Key Terms
| Term | Definition |
|---|---|
| Payload | The malicious action a piece of malware carries out |
| Bot/Zombie | An individual infected machine within a botnet |
| Command & Control (C2) | The server used by an attacker to communicate with and control bots |
| Propagation | The method by which malware spreads |
Watch Out For
> ⚠️ Virus vs. Worm vs. Trojan is a classic exam trap. Remember: Viruses need a host file, Worms need nothing (they spread alone), and Trojans need you to run them willingly.
> ⚠️ Rootkits don't always destroy data — their danger is stealth. They are designed to persist undetected, often surviving reboots.
> ⚠️ Keyloggers can be hardware devices (plugged between a keyboard and computer) — this is a physical security concern, not just a software one.
---
Attack Types
Summary
Attack types describe the methods adversaries use to compromise systems, steal data, or disrupt services. The CompTIA A+ exam expects you to recognize what each attack looks like and understand why it works.
Network-Based Attacks
Credential & Password Attacks
Phishing-Based Attacks
Key Terms
| Term | Definition |
|---|---|
| Vulnerability | A weakness in software, hardware, or processes |
| Exploit | Code or technique that takes advantage of a vulnerability |
| Zero-Day | A vulnerability unknown to the vendor at the time of exploitation |
| Injection Attack | Inserting malicious input into a system to manipulate its behavior |
Watch Out For
> ⚠️ DoS vs. DDoS: The key difference is scale and source. DoS = one attacker, one source. DDoS = many sources (botnet), much harder to mitigate.
> ⚠️ Brute Force vs. Dictionary Attack: Brute force tries everything; dictionary attacks are smarter and faster because they use likely candidates first.
> ⚠️ Zero-day attacks are dangerous precisely because no patch exists yet. This is why layered security (not just patching) is essential.
> ⚠️ SQL Injection is not just a developer problem — IT support professionals need to recognize it as a major data breach vector.
---
Social Engineering
Summary
Social engineering attacks target the human element of security rather than technical vulnerabilities. These attacks manipulate psychology — trust, fear, urgency, or authority — to bypass security controls. No amount of technical security can fully protect against a well-executed social engineering attack without user education.
Social Engineering Techniques
Key Terms
| Term | Definition |
|---|---|
| Social Engineering | Psychological manipulation of people into performing actions or divulging information |
| Pretext | A fabricated scenario used to justify a request for information |
| Vishing | Voice-based phishing attack |
| Tailgating | Unauthorized physical entry by following an authorized person |
Watch Out For
> ⚠️ Phishing vs. Vishing vs. Spear Phishing: Know the medium — Phishing = email, Vishing = voice/phone, Spear Phishing = targeted email. All are social engineering.
> ⚠️ Tailgating is a physical security threat, not a digital one. Common exam scenarios describe someone holding the door open — this is tailgating, not a network attack.
> ⚠️ Dumpster diving is surprisingly effective in real life — it's why shredding documents and properly disposing of hardware matters.
> ⚠️ Pretexting often precedes other attacks — attackers may pretext to gather information used later in spear phishing.
---
Security Tools & Best Practices
Summary
Defensive security relies on a combination of tools, policies, and practices working in layers — a concept known as defense in depth. No single tool or practice is sufficient on its own. The A+ exam tests your knowledge of what each tool does and why each practice matters.
Security Tools
- Detects and removes malicious software
- Signature-based detection: Matches files against a database of known malware signatures
- Heuristic/Behavioral detection: Identifies suspicious behavior patterns, even for unknown threats
- Software Firewall: Runs on a single host; protects only that device; typically controls application-level traffic
- Hardware Firewall: A dedicated physical appliance protecting an entire network; filters traffic at the network perimeter
- Aggregates and analyzes log data from multiple sources in real time
- Detects security threats, generates alerts, and supports incident response and forensics
- Think of it as a central security dashboard for an entire organization
Security Best Practices
- Requires two or more independent verification factors
- Three factor categories:
1. Something you know — password, PIN
2. Something you have — token, smartphone, smart card
3. Something you are — fingerprint, retina scan (biometric)
- Users and processes receive only the minimum permissions necessary to do their job
- Limits the blast radius of a compromised account or insider threat
- Regular application of software updates and security patches
- Mitigates exploitation of known vulnerabilities; directly counters zero-day risks once patches are released
- Data is encrypted on the sender's device and can only be decrypted by the intended recipient
- Prevents interception by third parties — including ISPs and service providers
Key Terms
| Term | Definition |
|---|---|
| Signature-based Detection | Identifying malware by matching it to a known pattern database |
| Heuristic Detection | Identifying malware by analyzing behavior rather than known signatures |
| MFA | Authentication requiring two or more independent verification factors |
| Least Privilege | Granting only the minimum access rights necessary |
| SIEM | Centralized system for collecting, analyzing, and responding to security events |
| Patch Management | Systematic process of deploying software updates to fix vulnerabilities |
| End-to-End Encryption | Encryption scheme where only communicating endpoints can read the messages |
Watch Out For
> ⚠️ Software vs. Hardware Firewall: A software firewall protects one machine. A hardware firewall protects the entire network. Enterprises use both.
> ⚠️ Signature-based detection cannot catch new/unknown malware — this is exactly why heuristic/behavioral detection is also needed.
> ⚠️ MFA factor categories matter: A PIN and a password are both "something you know" — using both is not true MFA. True MFA requires factors from different categories.
> ⚠️ Patch management doesn't protect against zero-day attacks at the time of the attack, only after a vendor releases a patch. This is why other security layers are necessary.
> ⚠️ SIEM does not prevent attacks — it detects and alerts. It is a monitoring and response tool, not a blocking tool.
---
Quick Review Checklist
Use this checklist to confirm your readiness before the exam:
Malware Types
Attack Types
Social Engineering
Security Tools & Best Practices
---
Focus your review on the "Watch Out For" sections — these represent the most commonly tested distinctions on the CompTIA A+ exam. Good luck!