easymultiple choiceObjective-mapped

Analysts see a malware campaign that changes its command-and-control domain every day, but the executable hash and a unique registry value remain the same across incidents. Which indicator is the best candidate for hunting?

Question 1easymultiple choice
Full question →

Analysts see a malware campaign that changes its command-and-control domain every day, but the executable hash and a unique registry value remain the same across incidents. Which indicator is the best candidate for hunting?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

The daily domain name used for command and control.

Domains change often in this campaign, so the indicator will not stay reliable.

B

Best answer

The executable hash from the malware sample.

A stable hash is a strong, specific indicator when the malware file itself remains unchanged.

C

Distractor review

The employee's home city where the alert was observed.

Victim location is not a reliable indicator for finding the malware on other systems.

D

Distractor review

The brand of the user's keyboard and mouse.

Peripheral hardware does not help identify or track the malware campaign across incidents.

Common exam trap

Common exam trap: answer the scenario, not the keyword

Many certification questions include familiar terms but test a specific constraint. Read the exact wording before choosing an answer that is generally true but wrong for this case.

Technical deep dive

How to think about this question

This question should be treated as a scenario, not a definition check. Identify the problem, the constraint and the best action. Then compare each option against those facts.

KKey Concepts to Remember

  • Read the scenario before looking for a memorised answer.
  • Find the constraint that changes the correct option.
  • Eliminate answers that are true in general but not in this case.
  • Use explanations to understand the rule behind the answer.

TExam Day Tips

  • Underline the problem statement mentally.
  • Watch for words such as best, first, most likely and least administrative effort.
  • Review why wrong options are wrong, not only why the correct option is correct.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Read the scenario before looking for a memorised answer.

What is the correct answer to this question?

The correct answer is: The executable hash from the malware sample. — The executable hash is the best hunting indicator because it remains stable across incidents when the malware binary does not change. In this scenario, the attacker rotates command-and-control domains to evade blocking, so the domain is not a dependable long-term indicator. A file hash, on the other hand, is specific enough to support detection and can be used in endpoint and threat-hunting workflows when the same malicious file reappears. Why others are wrong: The daily domain is intentionally changing, so it is a poor long-term hunting target. The employee's city is just contextual information about where an alert appeared, not a reusable indicator of compromise. Keyboard and mouse brand have no meaningful relationship to the malware and would not help defenders identify the campaign.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.