hardmulti selectObjective-mapped

A SOC analyst reviews an EDR alert showing powershell.exe launched with an encoded command, then immediately connected to an unfamiliar IP address and spawned rundll32.exe. The user is still logged in and the machine may still contain evidence needed for investigation. Which two actions should the analyst take first to contain the incident while preserving evidence? Select two.

Question 1hardmulti select
Full question →

A SOC analyst reviews an EDR alert showing powershell.exe launched with an encoded command, then immediately connected to an unfamiliar IP address and spawned rundll32.exe. The user is still logged in and the machine may still contain evidence needed for investigation. Which two actions should the analyst take first to contain the incident while preserving evidence? Select two.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Isolate the endpoint using EDR network containment or a quarantine policy.

This stops the suspected malware from communicating or spreading while preserving the disk and volatile evidence for later analysis.

B

Best answer

Disable the user account and revoke active sessions or tokens for that identity.

If the attacker obtained credentials, revoking sessions prevents reuse of the account from another device or service.

C

Distractor review

Reboot the workstation immediately to clear any malicious process from memory.

A reboot can destroy volatile evidence and may allow the attacker to reestablish persistence after startup.

D

Distractor review

Run a full vulnerability scan before taking any other action.

Scanning is useful later, but it delays containment and does not stop active malicious communication.

E

Distractor review

Delete the suspicious email from the mailbox to remove the original payload.

Removing the message does not contain the running threat and may destroy useful evidence about the initial vector.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: Isolate the endpoint using EDR network containment or a quarantine policy. — The best immediate actions are to isolate the endpoint and revoke the user’s active access. EDR containment cuts network communication and limits lateral movement without wiping the system, which preserves evidence for forensics. Revoking sessions or tokens is equally important when a malicious process appears to have launched under a real user context, because stolen credentials may be reused elsewhere. Both steps reduce impact quickly while keeping the investigation viable. Why others are wrong: Rebooting can erase volatile artifacts and sometimes makes response harder. A vulnerability scan is useful for remediation planning, but it is not an initial containment action. Deleting the email may remove the suspected source, but it does nothing to stop the active process already running on the endpoint.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.