Introduction
This chapter covers the third objective of Domain 2.0, Threats, Vulnerabilities, and Mitigations of the CompTIA Security+ exam.
In this chapter, we look at the various types of cybersecurity vulnerabilities—namely, applications, operating systems, and web-based vulnerabilities, as well as different types of hardware and cloud-specific vulnerabilities. The final sections of this chapter will explore the potential dangers of using third-party suppliers and mobile devices within your organization.
This chapter will give you an overview of why companies rely on these processes to keep their environment safe, ensuring you are prepared to successfully answer all exam questions related to these concepts for your certification.
Note
A full breakdown of Exam Objective 2.3 will be provided at the end of the chapter.