⚔️ Threats, Vulnerabilities, and Mitigations - SECPLUS Practice Questions

Study threat actors, attack types, vulnerability assessment, and mitigation strategies.

3Questions Available
1Exam Domains

Practice Threats & Attacks Questions Now

Start a timed practice session focusing on Threats, Vulnerabilities, and Mitigations topics from the SECPLUS question bank.

Start SECPLUS Practice Quiz →

SECPLUS Threats & Attacks Question Bank (3 Questions)

Browse all 3 practice questions covering Threats, Vulnerabilities, and Mitigations for the SECPLUS certification exam. Each question includes the full answer and a detailed explanation to help you understand the concepts.

  1. Question 1Threats, Vulnerabilities, and Mitigations

    An attacker calls the help desk pretending to be the CEO and demands a password reset. This is an example of:

    APhishing
    BVishing
    CPretexting
    DTailgating
    Show Answer & Explanation
    Correct Answer: C
    Explanation:

    Pretexting involves creating a fabricated scenario (pretext) to manipulate the target into giving up information.

  2. Question 2Threats, Vulnerabilities, and Mitigations

    Which threat actor typically has the MOST resources and funding available for sophisticated attacks?

    AHacktivist
    BOrganized crime
    CNation-state
    DScript kiddie
    Show Answer & Explanation
    Correct Answer: C
    Explanation:

    Nation-state actors have government-level funding, making them the most well-resourced threat actors.

  3. Question 3Threats, Vulnerabilities, and Mitigations

    Which of the following is an indicator of compromise (IoC) that suggests a system may be infected with malware?

    ARegular scheduled backups
    BUnexpected outbound network traffic
    CNormal CPU utilization
    DSuccessful user logins
    Show Answer & Explanation
    Correct Answer: B
    Explanation:

    Unexpected outbound traffic often indicates malware communicating with a command-and-control server.

Key Threats & Attacks Concepts for SECPLUS

threatattackvulnerabilitymalwaresocial engineeringindicator of compromise

SECPLUS Threats & Attacks Exam Tips

Threats, Vulnerabilities, and Mitigations questions in SECPLUS are typically scenario-based. Focus on service-level decision making aligned to official exam objectives. Priority concepts: threat, attack, vulnerability, malware, social engineering, indicator of compromise.

What SECPLUS Expects

  • Anchor your answer in select the most practical, secure, and scalable answer for the stated scenario.
  • Threats & Attacks scenarios for SECPLUS are frequently mapped to Domain 1 (12%), so read the objective carefully before picking controls or architecture.
  • Expect multi-service scenarios where Threats & Attacks interacts with IAM, networking, storage, or observability patterns rather than appearing as an isolated service question.
  • When two options are both technically valid, prefer the choice that best aligns with the exam's operational scope (Associate) and managed-service best practices.

High-Value Threats & Attacks Concepts

  • Know the core Threats & Attacks building blocks cold: threat, attack, vulnerability, malware.
  • Review the edge-case features and limits for social engineering, indicator of compromise; these details are commonly used to differentiate answer choices.
  • Practice service-integration reasoning: how Threats & Attacks pairs with Security Architecture, Security Operations in real deployment patterns.
  • For SECPLUS, explain why the chosen Threats & Attacks design meets reliability, security, and cost expectations better than the alternatives.

Common SECPLUS Traps

  • Watch for answers that partially solve the requirement but miss operational constraints.
  • Questions in General Security Concepts often include distractors that look correct for Threats & Attacks but violate least-privilege, durability, or availability requirements.
  • Avoid picking options purely by feature name; validate data path, failure handling, and governance impact before answering.
  • If the prompt hints at automation or repeatability, eliminate manual-only operational answers first.

Fast Review Checklist

  • Can you compare at least two Threats & Attacks implementation paths and justify which one best fits the scenario?
  • Can you map the chosen answer back to General Security Concepts (12%) outcomes for SECPLUS?
  • Can you explain security and access boundaries for Threats & Attacks without relying on default-open assumptions?
  • Can you describe how Threats & Attacks integrates with Security Architecture and Security Operations during failure, scaling, and monitoring events?

Exam Domains Covering Threats & Attacks

Related Resources

More SECPLUS Study Resources