A technician is documenting a security incident involving a potential data breach. The technician has collected logs, taken screenshots, and created a forensic image of the affected hard drive. The company's incident response policy requires that a formal report be submitted to management. Which of the following is the MOST critical element to include in the report?
Answer choices
Why each option matters
Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.
Distractor review
The names of all employees who accessed the system
While access logs are useful, the formal report must prioritize evidence integrity; employee names are secondary to the evidence's admissibility.
Distractor review
The estimated financial impact of the breach
Financial impact is often included later for business decisions, but it is not as critical as documenting how evidence was handled for legal defensibility.
Best answer
The chain of custody for all evidence
Chain of custody documents every person who handled the evidence, ensuring it has not been tampered with. This is essential for any potential legal action or regulatory compliance.
Distractor review
The steps taken to restore the system to normal operation
Restoration steps are part of the remediation phase and may be documented separately, but the formal incident report must first establish the integrity of the evidence.
Common exam trap
Common exam trap: answer the scenario, not the keyword
Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.
Technical deep dive
How to think about this question
This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.
KKey Concepts to Remember
- Read the scenario before looking for a memorised answer.
- Find the constraint that changes the correct option.
- Eliminate answers that are true in general but not in this case.
- Use explanations to understand the rule behind the answer.
TExam Day Tips
- Underline the problem statement mentally.
- Watch for words such as best, first, most likely and least administrative effort.
- Review why wrong options are wrong, not only why the correct option is correct.
Related practice questions
Related 220-1101 practice-question pages
Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.
CompTIA A+ hardware practice questions
Practise 220-1101 questions linked to CompTIA A+ hardware.
CompTIA A+ mobile devices practice questions
Practise 220-1101 questions linked to CompTIA A+ mobile devices.
CompTIA A+ networking practice questions
Practise 220-1101 questions linked to CompTIA A+ networking.
CompTIA A+ operating systems practice questions
Practise 220-1101 questions linked to CompTIA A+ operating systems.
CompTIA A+ security practice questions
Practise 220-1101 questions linked to CompTIA A+ security.
CompTIA A+ software troubleshooting questions
Practise 220-1101 questions linked to CompTIA A+ software troubleshooting questions.
CompTIA A+ operational procedures questions
Practise 220-1101 questions linked to CompTIA A+ operational procedures questions.
More questions from this exam
Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.
Question 1
A user reports intermittent network connectivity on a desktop computer. The technician observes that the Ethernet link light on the NIC turns off for a few seconds and then turns back on. The cable passes a wiremap test, the switch port is verified good with another device, and the NIC driver is updated. The issue occurs more frequently when the computer's case fan runs at high speed. Which of the following is the MOST likely cause?
Question 2
A workstation is unable to connect to the internet. The technician runs the 'ipconfig' command and sees the IPv4 address is 169.254.15.200 with a subnet mask of 255.255.0.0. The workstation can ping other devices on the local subnet but cannot ping the default gateway or any external addresses. Which TWO actions should the technician take to resolve this issue? (Select two.)
Question 3
A workstation is connected to a managed switch. It obtains a valid IP address (192.168.10.50) from the DHCP server, but it cannot ping the default gateway (192.168.10.1). The link light on both the workstation NIC and the switch port are solid green. Other workstations on the same switch CAN ping the default gateway successfully. The technician accesses the switch management interface and finds that the workstation's port is configured as an access port on VLAN 10. The default gateway is located on VLAN 20. An inter-VLAN router is configured but not explicitly allowing VLAN 10 access to VLAN 20. Which of the following is the MOST likely cause of the problem?
Question 4
A company develops a web application that relies on a custom library available only for a specific Linux distribution. They want to deploy the application in the cloud with minimal administrative overhead, but they need full control over the software stack, including the ability to install the custom library and configure the web server. Which cloud service model BEST meets these requirements?
Question 5
A company has a legacy virtual machine running on a deprecated hypervisor (Hyper-V). They want to migrate this VM to a new hypervisor (VMware vSphere) hosted in a private cloud while preserving the VM's configuration, installed applications, and data. The migration must be performed with minimal downtime. Which of the following methods is MOST appropriate?
Question 6
A company hosts a critical database on a virtual machine in a public cloud. The database requires persistent storage that must be retained even if the VM is terminated. The storage must also be accessible from multiple VMs simultaneously for a future high-availability configuration. Which type of cloud storage BEST meets these requirements?
FAQ
Questions learners often ask
What does this 220-1101 question test?
Read the scenario before looking for a memorised answer.
What is the correct answer to this question?
The correct answer is: The chain of custody for all evidence — Maintaining a clear chain of custody for all evidence is paramount in incident reports to ensure the admissibility and integrity of forensic data. While financial impact and restoration steps are important, the chain of custody is fundamental for legal and investigative purposes. Listing all employees who accessed the system may be part of the investigation but is not the most critical element for the formal report.
What should I do if I get this 220-1101 question wrong?
Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.
Discussion
Sign in to join the discussion.