CompTIA Certmaster CE Security+ Domain 2.0
Threats, Vulnerabilities, and Mitigations
Assessment
Save
Terms in this set (33)
A security analyst is investigating a not B, prob
security breach in a network system
that involves unauthorized access D. Credential replay
to user credentials and reusing
them multiple times. What is the
MOST likely type of attack that has
occurred?
Golden ticket attacks
Pass the ticket attacks
Buffer overflow attacks
Credential replay
https://quizlet.com/1143855712/comptia-certmaster-ce-security-domain-20-threats-vulnerabilities-and-mitigations-assessment-flash-cards/?new 1/23
,2/14/26, 5:18 PM CompTIA Certmaster CE Security+ Domain 2.0 Threats, Vulnerabilities, and Mitigations Assessment Flashcards | Quizlet
What technique does the threat D. Exploiting vulnerabilities or misconfigurations
actor use in a Bluetooth network in the Bluetooth protocol
attack to transmit malicious files to a
user's device?
Physically stealing a PC or laptop
to execute the attack
Spoofing a trusted access point to
gain unauthorized access
Obtaining credentials for remote
access to the network
Exploiting vulnerabilities or
misconfigurations in the Bluetooth
protocol
A recent cyberattack led to massive A. War
disruptions in a country's power
grid, causing widespread blackouts
and significant economic and social
damage. The country's cyber team
traced the attack to a hostile
nation-state's cyber warfare
division. In this case, what is the
primary motivation of the
perpetrators?
War
Financial gain
Ethical concerns
Levels of sophistication/capability
https://quizlet.com/1143855712/comptia-certmaster-ce-security-domain-20-threats-vulnerabilities-and-mitigations-assessment-flash-cards/?new 2/23
, 2/14/26, 5:18 PM CompTIA Certmaster CE Security+ Domain 2.0 Threats, Vulnerabilities, and Mitigations Assessment Flashcards | Quizlet
A large corporation is assessing its B. Regularly update firmware to the latest, most
cybersecurity practices by focusing secure versions.
on potential security risks linked to
hardware and firmware within the
company's extensive network of
computer systems. For the IT
department, which of the following
strategies MOST effectively
mitigates the risks related to
hardware and firmware security
vulnerabilities?
Allow unrestricted hardware
modifications for all employees.
Regularly update firmware to the
latest, most secure versions.
Restrict all software updates to
once a year to minimize disruptions.
Rely solely on perimeter defenses,
like firewalls and intrusion detection
systems.
https://quizlet.com/1143855712/comptia-certmaster-ce-security-domain-20-threats-vulnerabilities-and-mitigations-assessment-flash-cards/?new 3/23