Six Wild Security+ PBQs (and the Real-World Stories Behind Them)
We unpack six unforgettable practice-exam scenarios — from sideloading shenanigans to zero-day chaos — showing what really happens in the wild, why the wrong answers are wrong, and how to lock the lessons into memory.
Our team consists of CompTIA Security+ certified professionals with years of experience in cybersecurity education and IT training. We combine real-world expertise with exam preparation strategies.
Table of Contents
Performance-based questions on the Security+ exam aren't trivia — they're little slices of real life.
Below are six of the most memorable scenarios from our practice bank, retold in plain English with true U.S. incidents, easy-to-remember analogies, and a quick jab at every wrong answer.
Drop these stories into your mental flashcards and you'll walk into the test feeling like you've already lived it.
1. Sideloading: The Back-Alley App Store
Picture this: you skip Google Play, grab a random APK from a forum, and hit install. That shortcut is called sideloading — and it's exactly how the vast majority of iOS and Android malware still sneaks in. Apple's own threat analysis on sideloading (2021) blamed non-App-Store installs for nearly every iPhone infection they investigated.
- Why the wrong picks miss the mark: Jailbreaking and rooting give you super-user powers (and often lead to sideloading later), but the act of installing the rogue app itself is sideloading. Carrier unlocking just lets your SIM hop networks.
Mind-map showing sideloading, jailbreaking, and rooting risks and overlaps
Why sideloading, jailbreaking, and rooting overlap — and where each one is unique
2. Jailbreaking & Rooting: Master Keys You Probably Don't Need
On iPhones it's called jailbreaking; on Android it's rooting. Either way you're ripping out the manufacturer's safety rails so you (or an attacker) can poke around the entire OS. Need proof it matters? Pegasus spyware used zero-click jailbreaks to spy on U.S. diplomats for years before Apple closed the hole.
- Tip for the exam: If the question shouts "remove restrictions on iOS," the test wants "jailbreaking." If it's Android, answer "rooting."
3. Zero-Day: Beaten Before the Patch Drops
A zero-day is basically a cheat code the vendor hasn't seen yet. Remember the MOVEit file-transfer fiasco in 2023? CL0P ransomware crews found an SQL injection nobody knew about, looted data across the U.S., then the patch arrived. That's zero-day in action.
- Replay and on-path attacks recycle or intercept traffic — they don't rely on brand-new bugs.
- IV attacks target ancient WEP Wi-Fi; fun history, but not a zero-day.
Timeline diagram showing zero-day lifecycle from bug discovery to user patches
Zero-day exploits race ahead of the vendor's patch cycle
4. Ransomware: Digital Kidnapping at Scale
You know the drill: files encrypted, a skull-and-crossbones note, "Pay us ₿ or else." In 2024 BlackCat/ALPHV froze Change Healthcare billing systems, snarling U.S. pharmacies nationwide — a reminder that ransomware isn't theoretical and definitely isn't going away.
- Viruses replicate, spyware snoops, adware spams. Only ransomware locks your stuff and demands cash.
Bar chart comparing 2024 vs 2025 average ransomware payouts across industries
Average ransomware payouts keep climbing — especially in finance
5. RATs: Remote Access Trojans That Turn Your PC Into a Puppet
Slip a RAT onto a machine and you're basically sitting at the keyboard from miles away. In 2024 the FBI warned about HiatusRAT hijacking American webcams and DVRs, proving that old-school remote-control malware is alive and well.
- APT = the threat group, MaaS = "malware-as-a-service" business model, PUP = annoying bloatware. RAT is the one that opens the backdoor and hands you full admin.
6. SQL Injection: Sweet-Talking the Database Into Spilling Everything
Feed crafty SQL into a login box and you can make the database hand over the keys — that's a classic SQL injection. The MOVEit breach started with an SQLi zero-day that dropped web shells and siphoned gigabytes before anyone knew.
- XSS targets browsers, not databases.
- RCE goes after the OS layer.
- CSRF tricks users into sending requests. SQLi speaks directly to the DB.
Attack-path diagram showing how malicious input travels from web form to database exfiltration
One unsanitised query can route an attacker straight to sensitive data
Turning Stories Into Exam Points
- Link every term to a headline (Change Healthcare, MOVEit, Pegasus). Stories stick.
- When you see a PBQ, trace the chain: attack → impact → fix. That mental flowchart scores easy points.
- If two answers feel right, ask "What's the attacker's goal in this story?" Extortion? Theft? Remote control? Match goal to term.
💡 Pro Tip: Practice Makes Perfect
The best way to master PBQs is through hands-on practice. Our practice exams include realistic performance-based questions that mirror what you'll see on the actual exam. Each question comes with detailed explanations that break down not just the right answer, but why other choices are wrong.
Visual Learning: Attack Patterns at a Glance
The images throughout this post illustrate key attack patterns and methodologies. Understanding these visual representations can help you quickly identify scenarios in PBQs:
- Mobile Attack Vectors: Shows how sideloading, jailbreaking, and rooting create different security risks
- Zero-Day Timeline: Illustrates the race between attackers and defenders
- Ransomware Economics: Demonstrates why certain industries are targeted more frequently
- SQL Injection Flow: Traces the path from malicious input to data breach
🚀 Ready to Tackle PBQs?
Practice with our comprehensive exam simulator featuring realistic performance-based questions. Get instant AI-powered explanations and track your progress across all Security+ domains.
References
- CompTIA. "CompTIA Security+ (SY0-701) Exam Objectives." comptia.org/certifications/security. PBQ format, domain coverage, and exam structure.
- Krebs, Brian. "BlackCat Ransomware Group Implodes After Apparent $22M Payment by Change Healthcare." krebsonsecurity.com. March 2024. Reporting on the Change Healthcare ransomware incident.
- CISA & FBI. "#StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability." cisa.gov/cybersecurity-advisories/aa23-158a. June 2023. Joint advisory on the MOVEit Transfer SQL injection zero-day exploited by CL0P.
- Citizen Lab, University of Toronto. "NSO Group's Pegasus Spyware." citizenlab.ca. Research on commercial spyware and zero-day exploits.
Note: All real-world incidents mentioned are based on publicly reported cybersecurity events. Company and malware names are used for educational purposes to provide context for Security+ exam preparation.
Ready to Advance Your Career?
Get instant access to comprehensive practice exams with AI-powered explanations. Track your progress and master every domain with our smart study tools.
Related Articles
How Hard Is Security+? Honest Difficulty Assessment for 2026
Wondering how hard is Security+? Get an honest assessment of Security+ exam difficulty, pass rates (~70-75%), study time needed, and tips based on your IT background. Compare to Network+, A+, and CySA+.
Security+ Pass Rate Statistics 2026: What Percentage Pass the Exam?
Comprehensive analysis of Security+ pass rates including first attempt statistics, SY0-701 pass rates, factors affecting success, and proven strategies to improve your chances of passing.