hardmulti selectObjective-mapped

A Windows laptop is believed to be involved in a credential-theft incident. It is still powered on, connected to Wi-Fi, and the user reports that the screen recently locked by itself. The SOC can reach the device remotely through EDR. Which two actions should be taken before the laptop is shut down? Select two.

Question 1hardmulti select
Full question →

A Windows laptop is believed to be involved in a credential-theft incident. It is still powered on, connected to Wi-Fi, and the user reports that the screen recently locked by itself. The SOC can reach the device remotely through EDR. Which two actions should be taken before the laptop is shut down? Select two.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Capture volatile data such as running processes and active network connections while the system is still live.

Volatile data disappears on shutdown, so collecting it first protects the most transient evidence. Running processes and live connections can reveal malware, remote-control tools, or current attacker activity. This is especially important when the device is still powered on and reachable through EDR.

B

Best answer

Place the endpoint into network isolation through the EDR console to stop further attacker communication.

Isolation limits further spread, exfiltration, and remote tampering without requiring immediate power loss. Because the host is still online, EDR isolation is a controlled way to contain the threat while preserving the possibility of collecting evidence first. It is a more measured choice than yanking power or rebooting.

C

Distractor review

Run a full antivirus scan immediately, because the scan report will serve as the primary evidence.

A full scan can change files, trigger malware behavior, and overwrite useful artifacts. It is not the best first action when the priority is preserving volatile evidence and containing the endpoint. Scan results also do not replace live data capture.

D

Distractor review

Reboot the laptop into Safe Mode so the attacker’s code will not load.

Rebooting destroys volatile evidence and may trigger malicious cleanup or encryption behavior. Safe Mode can be useful later for remediation, but it is not appropriate before collecting live data from a suspected compromised system.

E

Distractor review

Power off the laptop immediately to prevent the incident from spreading further.

Immediate power-off prevents any further live collection and can destroy evidence that exists only in memory or active sessions. While it may stop some malicious activity, it is too blunt for the stated requirement to preserve evidence first.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: Capture volatile data such as running processes and active network connections while the system is still live. — The best actions are to capture volatile data and isolate the endpoint through EDR. Live collection preserves memory-resident evidence such as running processes, open sockets, and in-memory indicators that would vanish on shutdown. Isolation then limits additional attacker communication without forcing an immediate reboot or power loss. Together, those steps align with incident response best practices for a powered-on compromised laptop. Why others are wrong: A full scan, reboot, or immediate shutdown all risk destroying volatile evidence and may interfere with later forensic analysis. They can be valid remediation steps eventually, but they are not the best first actions when the device is still live and the response team can isolate it remotely.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.