Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C795 (CompTIA Security+ SY0-701): ULTIMATE Context-Driven Study Guide - Performance-Based Scenarios & Exam Blueprint Mastery

Beoordeling
-
Verkocht
-
Pagina's
48
Cijfer
A+
Geüpload op
10-02-2026
Geschreven in
2025/2026

Accelerate your WGU C795 course completion and PASS the CompTIA Security+ (SY0-701) exam with this ULTIMATE Context-Driven Study Guide. Specifically designed for the WGU assessment structure, this comprehensive guide moves beyond memorization to teach you how to apply security concepts to real-world, performance-based scenarios. It breaks down the entire SY0-701 exam blueprint into digestible modules focused on threats, attacks, and vulnerabilities; architecture and design; implementation; operations and incident response; and governance, risk, and compliance. Each module integrates hands-on exercises, PBQ (Performance-Based Question) walkthroughs, and contextual explanations that link theory to practical implementation. Master the exact skills needed for both the WGU objective assessment and the CompTIA certification. This is the definitive resource for competency-based learning, ensuring you not only know the material but can execute it.

Meer zien Lees minder
Instelling
WGU C795
Vak
WGU C795

Voorbeeld van de inhoud

WGU C795 (CompTIA Security+ SY0-701):
ULTIMATE Context-Driven Study Guide -
Performance-Based Scenarios & Exam Blueprint
Mastery



DOMAIN 1: THREATS, ATTACKS, AND VULNERABILITIES

Focus: Identifying Attack Patterns, Malware Behaviors, and Indicators of Compromise



Scenario Q1:

A security analyst reviewing SIEM logs notices multiple failed login attempts from a
foreign IP against the VPN gateway, followed 20 minutes later by a successful login
from the internal HR department's IP range. The HR user account shows no recent
password change activity. What type of attack is MOST likely occurring?

A) Credential stuffing

B) Pass-the-hash

C) Password spraying

D) Brute force

Correct Answer: B

Complete Solution:

,Step 1: Context Breakdown

●​ Role: Security Analyst (monitoring/detection function)
●​ Threat Pattern: External reconnaissance (failed foreign logins) → lateral
movement via internal HR IP
●​ Key Anomaly: Successful internal login without password change after external
targeting
●​ Action Keyword: "MOST likely" — requires matching attack pattern to observed
indicators

Step 2: Concept Reinforcement
This describes lateral movement using compromised credentials without knowing the
plaintext password. Pass-the-hash attacks use NTLM hash values stolen from one
system to authenticate to others, leaving no password change trail.

Step 3: Why Right & Why Wrong

TableCopy


Answer Analysis



External reconnaissance followed by internal lateral movement without
B) Pass-the-hash ✓ password change = hash replay. The HR IP suggests the attacker
pivoted to an internal system.



Uses breached username/password pairs from other sites. Would
A) Credential stuffing show successful external login, not failed external then successful
internal.



Uses common passwords against many accounts. Would show
C) Password spraying multiple accounts targeted, not one account with lateral movement
pattern.

, Attempts all possible passwords. Would take far longer and generate
D) Brute force massive log volume; unlikely to succeed in 20 minutes against a VPN
gateway.


Step 4: Exam Relevance
Tests Objective 1.2: Compare and contrast types of attacks, specifically
credential-based attacks and lateral movement techniques.

ProTip: When you see "successful login without password change" after external
activity, immediately consider hash-based attacks or Kerberoasting. The absence of
password change is the critical differentiator.



Scenario Q2:

Following a malware outbreak, your incident response team isolates infected
workstations. Forensic analysis reveals a fileless malware that resides only in memory,
establishes a reverse shell to a C2 server, and uses PowerShell to enumerate domain
users. Which MITRE ATT&CK tactic BEST describes the PowerShell activity?

A) Initial Access

B) Execution

C) Discovery

D) Collection

Correct Answer: C

Complete Solution:

Step 1: Context Breakdown

, ●​ Role: Incident Responder (forensic analysis phase)
●​ Attack Stage: Post-exploitation (fileless malware active, C2 established)
●​ Specific Activity: PowerShell used to "enumerate domain users"
●​ Action Keyword: "BEST describes" — requires precise MITRE tactic mapping

Step 2: Concept Reinforcement
MITRE ATT&CK tactics represent the "why" of an attack technique. Discovery (TA0007)
involves techniques that allow adversaries to gain knowledge about the system and
internal network—specifically including account and permission enumeration.

Step 3: Why Right & Why Wrong

TableCopy


Answer Analysis



Enumerating domain users is classic reconnaissance to understand the
C) Discovery ✓
environment for privilege escalation or lateral movement targets.



A) Initial Access Already completed—malware is resident and C2 is established.



PowerShell is the execution method, but the purpose of this specific activity
B) Execution is discovery. The question asks what the activity describes, not what tool is
used.



Involves gathering data of interest (files, credentials). Enumeration is
D) Collection
reconnaissance, not data collection.


Step 4: Exam Relevance
Tests Objective 1.7: Explain the techniques used in penetration testing, including MITRE
ATT&CK framework application.

Geschreven voor

Instelling
WGU C795
Vak
WGU C795

Documentinformatie

Geüpload op
10 februari 2026
Aantal pagina's
48
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.00
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
PrimeScholars Rasmussen college
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
30
Lid sinds
1 jaar
Aantal volgers
0
Documenten
2046
Laatst verkocht
2 dagen geleden
ExamPrep Hub

ExamPrep Hub delivers premium expertly curated exam materials designed for serious students who aim for top performance. our resources are structured for clarity, accuracy, and efficiency helping you master concept, revise smarter and achieve outstanding result

4.0

6 beoordelingen

5
4
4
0
3
1
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen