CompTIA A+ Security Threats: Study Guide
Overview
Security threats are a core component of the CompTIA A+ exam, covering how attackers compromise systems through software, social manipulation, network exploitation, and physical access. Understanding the types, mechanisms, and distinguishing characteristics of each threat is essential for both the exam and real-world IT support roles. This guide organizes all major threat categories with key definitions, comparisons, and exam tips.
---
Malware Types
Summary
Malware (malicious software) encompasses a wide range of programs designed to damage, disrupt, or gain unauthorized access to systems. The A+ exam tests your ability to distinguish between malware types based on how they spread, how they hide, and what they do.
Key Malware Types
| Malware Type | How It Spreads | Key Characteristic |
|---|---|---|
| Virus | Requires host file + user action | Self-replicates by attaching to files |
| Worm | Self-replicates autonomously | No host file needed; exploits network vulnerabilities |
| Trojan Horse | User executes it (disguised as legitimate software) | Does NOT self-replicate |
| Ransomware | Phishing emails, malicious downloads | Encrypts files; demands payment for decryption key |
| Keylogger | Installed via malware or physical device | Records every keystroke; steals credentials |
| Rootkit | Bundled with other malware | Hides deep in OS/firmware/bootloader; maintains persistent access |
| Botnet | Malware infection across multiple systems | Network of "bots" controlled by a botmaster |
Key Terms
Critical Comparisons
Watch Out For
> ⚠️ Exam Tip: Students often confuse Trojans and viruses. Remember: Trojans = disguise, no self-replication. Viruses = self-replicate via host file.
> ⚠️ Exam Tip: Rootkits are NOT easily removed by standard antivirus tools because they operate at the kernel or bootloader level — this detail frequently appears on exams.
> ⚠️ Exam Tip: A logic bomb is NOT the same as ransomware. A logic bomb waits for a trigger condition; ransomware immediately begins encrypting files upon execution.
---
Social Engineering
Summary
Social engineering attacks exploit human psychology rather than technical vulnerabilities. Attackers manipulate victims into revealing credentials, granting access, or performing actions that compromise security. The A+ exam heavily tests your ability to identify these attacks by their delivery method.
Key Social Engineering Attacks
| Attack | Delivery Method | Key Detail |
|---|---|---|
| Phishing | Email | Broad, mass-distributed; mimics trusted organizations |
| Spear Phishing | Email | Targeted at a specific individual/organization; personalized |
| Vishing | Phone/Voice call | Impersonates IT support or authority figure |
| Smishing | SMS/Text message | Mimics banks, delivery services, etc. |
| Tailgating/Piggybacking | Physical | Unauthorized person follows authorized person through a secured door |
| Baiting | Physical (USB drop) | Infected USB left in public; relies on victim's curiosity |
| Pretexting | Any channel | Fabricated scenario to manipulate victim into giving information |
Key Terms
Critical Comparisons
Watch Out For
> ⚠️ Exam Tip: Know all four phishing variants by delivery channel: Email = Phishing/Spear Phishing, Voice = Vishing, Text = Smishing.
> ⚠️ Exam Tip: Pretexting is a technique, not just an attack type — it can be used within vishing, smishing, or in-person scenarios.
> ⚠️ Exam Tip: Tailgating exploits human courtesy (holding doors open). Countermeasures include mantrap doors, security guards, and employee awareness training.
---
Network-Based Threats
Summary
Network-based threats exploit weaknesses in protocols, infrastructure, or communication channels to intercept data, disrupt services, or gain unauthorized access. These attacks often require technical sophistication but can have organization-wide impact.
Key Network Threats
| Threat | What It Does | Key Detail |
|---|---|---|
| DoS Attack | Floods target with traffic; makes it unavailable | Single source |
| DDoS Attack | Same as DoS but from multiple compromised systems | Coordinated via botnet |
| Man-in-the-Middle (MITM) | Intercepts/alters communications between two parties | Both parties believe they're communicating directly |
| Evil Twin | Rogue Wi-Fi AP mimicking a legitimate one | Captures credentials and session data |
| DNS Poisoning | Corrupts DNS cache with fraudulent records | Redirects users to malicious sites |
| Session Hijacking | Captures authentication tokens/session cookies | Impersonates authenticated user without knowing password |
| Zero-Day Exploit | Targets unknown vulnerability with no patch | Zero days of warning for defenders |
Key Terms
Critical Comparisons
Watch Out For
> ⚠️ Exam Tip: Session hijacking ≠ knowing the password. The attacker steals the session token/cookie after authentication has already occurred.
> ⚠️ Exam Tip: Zero-day exploits are dangerous because no patch exists yet — the defender has no technical fix available, only detection/mitigation strategies.
> ⚠️ Exam Tip: Evil twin attacks target Wi-Fi users in public spaces — connecting to "free Wi-Fi" is a common vector. Always verify network legitimacy.
---
Physical & Environmental Threats
Summary
Physical security threats bypass all technical controls by targeting people and physical spaces. The A+ exam expects you to recognize these low-tech but highly effective attack vectors and their corresponding countermeasures.
Key Physical Threats
| Threat | Method | Countermeasure |
|---|---|---|
| Shoulder Surfing | Visually observing screen/keyboard in public | Privacy screens, user awareness |
| Dumpster Diving | Searching discarded trash for sensitive info | Shredding documents, secure hardware disposal |
| Hardware Keylogger | Physical device inserted between keyboard and computer | Regular inspection of physical hardware, port locks |
| Tailgating | Following authorized user through secured entry | Mantraps, security guards, access badges |
| Baiting (USB Drop) | Infected USB left in public places | Disabling USB ports, user awareness training |
Key Terms
Watch Out For
> ⚠️ Exam Tip: Hardware keyloggers are invisible to antivirus software because they don't exist as files on the OS — this is a key differentiator from software keyloggers.
> ⚠️ Exam Tip: Dumpster diving is legal in many jurisdictions unless no-trespassing laws apply — this makes proper document disposal policies critical.
---
Threat Indicators & Key Concepts
Summary
Some threats don't fit neatly into one category. Understanding backdoors and logic bombs rounds out your knowledge of how attackers establish persistence and delayed damage.
Key Concepts
- An intentional or unintentional hidden access point in software or a system
- Can be created by developers for maintenance or implanted by attackers through malware
- Allows unauthorized persistent access without normal authentication
- Malicious code that remains dormant until a specific trigger condition is met
- Triggers can include: a specific date/time, a user action, or a system event
- Often planted by disgruntled insiders with system access
- Difficult to detect before it triggers because it appears inactive
Key Terms
Watch Out For
> ⚠️ Exam Tip: Logic bombs are often associated with insider threats — disgruntled employees with system access. If a scenario describes malicious code that "activated on a specific date," think logic bomb.
> ⚠️ Exam Tip: Backdoors are not always malicious in origin — developers create them intentionally. However, attackers also implant backdoors via malware for persistent access.
---
Quick Review Checklist
Use this checklist to confirm you can answer each item before your exam:
Malware
Social Engineering
Network Threats
Physical Threats
---
Master these distinctions and you'll be well-prepared for security threat questions on the CompTIA A+ exam. Focus especially on how each threat spreads or is delivered — the exam frequently tests these differentiating characteristics.