mediummultiple choiceObjective-mapped

A security analyst detects real-time data exfiltration from a critical production database that supports customer transactions. The exfiltration appears to be occurring via a compromised application service account. Which containment strategy should the analyst implement FIRST to minimize damage while preserving forensic data?

Question 1mediummultiple choice
Full question →

A security analyst detects real-time data exfiltration from a critical production database that supports customer transactions. The exfiltration appears to be occurring via a compromised application service account. Which containment strategy should the analyst implement FIRST to minimize damage while preserving forensic data?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Disconnect the database server from the network.

Correct. Disconnecting the server immediately stops the data flow to the attacker, preserving the database state and forensic data without crashing the server.

B

Distractor review

Shut down the database server.

Incorrect. Shutting down the server can cause loss of volatile evidence (e.g., running processes, network connections) and may result in data corruption or disruption to critical services.

C

Distractor review

Implement network segmentation to isolate the server.

Incorrect. While segmentation is a good long-term containment measure, it takes time to configure and does not immediately stop the active exfiltration that is already in progress.

D

Distractor review

Block the IP address of the suspected attacker.

Incorrect. Blocking an IP address is a weak containment measure because attackers often use multiple IPs or anonymization techniques, and it does not address the compromised internal account that is still connected.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: Disconnect the database server from the network. — During an incident, the first priority after detection is to contain the threat and stop the immediate damage. Disconnecting the database server from the network (option A) is the most effective first step because it immediately halts the ongoing data exfiltration without destroying volatile data in memory. Shutting down the server (option B) risks losing uncommitted transactions and can destroy evidence. Implementing network segmentation (option C) takes time to configure and does not stop the current connection. Blocking the attacker's IP address (option D) is less effective because the attacker may use multiple IPs or proxies, and it does not disconnect the compromised internal service account.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.