hardmultiple choiceObjective-mapped

Exhibit

EDR event timeline:
14:02:11 excel.exe spawned powershell.exe with -enc parameter
14:02:13 powershell.exe created scheduled task: "OneDrive Update"
14:02:18 explorer.exe began renaming multiple .docx files to .lock
14:02:21 outbound HTTPS connection to 198.51.100.77:443
14:02:24 security service attempted to terminate, then recovered

Based on the exhibit, what is the BEST immediate containment action?

The workstation is still powered on, and the user reports that files are being renamed and the system is running very slowly. The security analyst confirms malicious activity is in progress.

Question 1hardmultiple choice
Full question →

Based on the exhibit, what is the BEST immediate containment action?

The workstation is still powered on, and the user reports that files are being renamed and the system is running very slowly. The security analyst confirms malicious activity is in progress.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Immediately isolate the endpoint from the network using EDR containment or switch quarantine.

The device is actively exhibiting ransomware-like behavior, and isolation stops lateral spread and additional command-and-control traffic while preserving the powered-on system for later review.

B

Distractor review

Power off the workstation immediately to prevent any further file changes.

Shutting down can interrupt the malware, but it also destroys volatile evidence and is usually not the first choice when containment can be achieved remotely.

C

Distractor review

Uninstall Microsoft Office so the malicious spreadsheet cannot launch again.

Removing the office suite does not contain the incident in real time and does not stop current encryption or outbound malicious traffic.

D

Distractor review

Block the destination IP address at the firewall and wait for the user to log off.

Blocking one destination may help, but waiting leaves the compromised host connected and capable of spreading or encrypting additional data.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Immediately isolate the endpoint from the network using EDR containment or switch quarantine. — The event sequence strongly suggests active malware with ransomware behavior: encoded PowerShell, persistence via scheduled task, file renaming, and outbound beaconing. The best immediate action is to isolate the endpoint through EDR or network quarantine. That contains the threat quickly, limits lateral movement, and preserves the machine in a live state for follow-up analysis. It is more effective than waiting for the user to disconnect or making disruptive changes that do not stop the incident promptly. Why others are wrong: Powering off may be appropriate in some cases, but it sacrifices volatile evidence and is not the best first containment step when remote isolation is available. Uninstalling Office does not stop the current malicious process or the scheduled task. Blocking the source IP helps, but it is incomplete if the host can still reach other internal systems or if the malware switches infrastructure.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.