mediummultiple choiceObjective-mapped

Security receives a company laptop used in an insider theft investigation. A manager wants the device moved to another office for review by legal staff. Which action best supports chain of custody?

Question 1mediummultiple choice
Full question →

Security receives a company laptop used in an insider theft investigation. A manager wants the device moved to another office for review by legal staff. Which action best supports chain of custody?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Distractor review

Power on the laptop to confirm the user profile and recent activity before transport.

Turning it on can alter evidence and create new timestamps, which weakens forensic integrity and chain of custody.

B

Best answer

Place it in a labeled evidence bag, record the collector, time, location, and condition, and require signatures for each transfer.

Chain of custody depends on proving who handled the evidence, when, where, and in what condition. Documenting the device at collection, sealing it appropriately, and recording every transfer creates a defensible record that supports legal review. This approach reduces the risk of tampering claims and helps establish that the laptop was preserved from the moment it was seized until it reaches legal or forensic personnel.

C

Distractor review

Remove the drive and clone it without documenting the collection process.

Cloning may be useful later, but undocumented handling breaks the custody record and makes the evidence harder to defend legally.

D

Distractor review

Email a photo of the laptop to legal and leave the original on a desk.

A photo does not preserve evidence integrity, and leaving the original unsecured creates an obvious tampering risk.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Place it in a labeled evidence bag, record the collector, time, location, and condition, and require signatures for each transfer. — The best chain-of-custody action is to document and control every handoff from the moment the device is collected. That means recording the item’s condition, sealing it if appropriate, logging the collector and time, and requiring signatures for later transfers. These steps demonstrate continuity and reduce the chance that evidence was altered, substituted, or mishandled. In investigations that may involve HR or legal action, that documentation is essential. Why others are wrong: Powering on the laptop can change the evidence and create new data that was not present when it was seized. Removing the drive and cloning it may be part of forensic work, but doing so without documentation undermines custody. Sending a photo to legal is not a substitute for preserving the original device and maintaining a documented evidence trail.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.