Master threat actor attributes, social engineering tactics, malware taxonomy, and network attack techniques โ with an interactive quiz and threat identifier tool built for SY0-701 scenario questions.
๐ฏ Take the Practice QuizSecurity+ SY0-701 tests your ability to identify threat actors and classify attack types in scenario questions. Domain 2 (Threats, Vulnerabilities, and Mitigations) is 22% of the exam.
Classified by motivation, capability, and resources. Understanding the why helps predict tactics, techniques, and procedures (TTPs).
Exploits psychological principles โ authority, urgency, fear โ rather than technical vulnerabilities. People are the primary attack surface.
Classified by how it spreads, what it does, and how it hides. Understanding the taxonomy is critical for Security+ scenario questions.
Technical attacks targeting network protocols, authentication systems, and application input validation.
Security+ tests application, not just memorization. A question will describe a scenario and ask "what type of attack is this?" or "which threat actor is most likely responsible?" โ you need to identify the distinguishing detail that classifies it.
The details that distinguish each actor type and attack category on SY0-701 scenario questions.
Government-sponsored. Most sophisticated and well-funded. Advanced Persistent Threat โ long-term, stealthy presence.
Current/former employee or contractor with legitimate access. Hardest to detect โ bypasses perimeter controls.
Attacks driven by ideology or political beliefs. Targets: government, corporations, controversial organizations.
Financially motivated criminal groups operating at scale. Deploy ransomware, BEC fraud, credential theft, and sell stolen data on dark web markets.
Uses pre-built scripts and tools without deep technical understanding. Opportunistic โ scans for known vulnerabilities rather than targeting specific organizations.
Employees or departments using unauthorized apps, cloud services, or devices without IT approval. Creates inadvertent security gaps โ not always malicious in intent.
| Actor | Internal/External | Sophistication | Resources | Typical TTPs |
|---|---|---|---|---|
| Nation-State | External | Very High | Very High | Zero-days, supply chain attacks, long-term persistence |
| Insider Threat | Internal | Varies | Varies (privileged access) | Data exfiltration, sabotage, privilege abuse |
| Hacktivist | External | Medium | LowโMedium | DDoS, website defacement, data leaks |
| Organized Crime | External | MediumโHigh | MediumโHigh | Ransomware, phishing, BEC, credential theft, data brokering |
| Unskilled Attacker | External | Low | Low | Pre-built exploit tools, port scanning, opportunistic vulnerability exploitation |
| Shadow IT | Internal | Low (unintentional) | Varies | Unauthorized SaaS apps, personal cloud storage, unmanaged devices โ creates unmonitored attack surface |
Filter by category to highlight, or view all together. Focus on the distinguishing attributes used in exam scenarios.
| Criterion | ๐ต๏ธ Threat Actors | ๐ญ Social Engineering | ๐ฆ Malware | ๐ Network Attacks |
|---|---|---|---|---|
| Primary Target | Organizations, governments, individuals โ based on actor motivation | The human โ bypasses technical controls entirely | Endpoints, servers, infrastructure | Network infrastructure, applications, protocols |
| Attack Vector | Varies by actor type and motivation | Email, phone, SMS, physical, in-person | Email attachments, drive-by downloads, USB, exploitation | Network traffic, protocols, web application input |
| Key Differentiator | Motivation distinguishes actor type (financial vs. political vs. ideological) | Exploits psychological principles, not technical flaws | Spread method + payload defines malware type | Protocol/layer exploited (network, app, auth) |
| Sophistication Level | Unskilled attacker (low) โ Nation-state (very high) | LowโHigh (from generic phishing to BEC) | Low (basic virus) โ High (fileless, rootkit) | Moderate (DDoS) โ High (pass-the-hash, zero-day) |
| Hardest to Detect | Nation-state APT (persistent, slow, stealthy) | Watering hole + pretexting (no suspicious email) | Fileless malware + rootkit (no disk artifacts) | On-path / ARP poisoning (passive eavesdropping) |
| Primary Countermeasure | Threat intelligence, zero trust, insider threat programs | Security awareness training, MFA, email filtering | EDR/AV, application allowlisting, patch management | Firewalls, IDS/IPS, input validation, salting/hashing |
| Exam Keyword | "government-sponsored," "ideological," "disgruntled employee" | "urgent," "CEO email," "USB in parking lot," "phone call" | "encrypts," "no user action needed," "hides in kernel" | "intercept," "overwhelm," "inject," "replay," "hash" |
| Notable Example | Nation-state: SolarWinds supply chain attack (APT) | BEC: $47M wire fraud via spoofed CEO email (2015) | Ransomware: Colonial Pipeline โ DarkSide group (2021) | DDoS: Dyn DNS attack via Mirai botnet (2016) |
Read each scenario and identify the attack type before revealing the breakdown โ just like SY0-701 scenario questions.
10 scenario-based questions with per-category breakdown โ just like the real SY0-701 exam format.
Answer 3 questions to identify the attack type or threat actor in your scenario โ built around real SY0-701 question patterns.
Click each card to flip it and reveal the mnemonic.
๐ Tap a card to flip
| If the exam saysโฆ | Key detail | Answer |
|---|---|---|
| "Government-sponsored," "zero-day," "14-month dwell time" | Long-term, stealthy, political | Nation-state / APT |
| "Disgruntled employee," "planted code," "deleted records on last day" | Internal + privileged access | Insider Threat |
| "No user action needed," "spread across network automatically" | Self-replication | Worm |
| "Encrypts files," "ransom note," "also exfiltrated data" | Encrypt + leak threat | Double Extortion Ransomware |
| "Hides itself," "AV finds nothing," "kernel-level" | Deep OS hiding | Rootkit |
| "Captured hash," "authenticated without cracking password" | Uses hash directly | Pass-the-Hash |
| "Flooded with traffic from thousands of IPs" | Distributed sources | DDoS (Botnet) |
| "USB left in parking lot," "labeled Payroll" | Physical lure | Baiting |
| "CEO email, urgent wire transfer, slightly wrong domain" | Financial fraud via email | BEC / Spear Phishing |
| "Phone call, claimed to be IT support, asked for password" | Voice + authority | Vishing + Pretexting |
| "Opportunistic," "downloaded tools," "ran a script," "no specific target" | Official SY0-701 term | Unskilled Attacker |
| "Ransomware group," "organized," "financial motive," "RaaS" | Official SY0-701 term | Organized Crime |
| "Unauthorized Dropbox," "personal cloud storage," "unapproved SaaS" | Internal, unintentional risk | Shadow IT |