๐Ÿšจ CompTIA Security+ SY0-701 ยท Domain 4

Incident Response Lifecycle
PICERL ยท Detection ยท Containment ยท Forensics

Master the six PICERL phases, SIEM/SOAR, indicators of compromise, containment strategies, order of volatility, and chain of custody โ€” with scenario-based quizzes and an IR advisor tool built for SY0-701.

๐ŸŽฏ Take the Practice Quiz
Incident Response Lifecycle

Domain 4 (Security Operations) is 28% of the SY0-701 exam. Incident response questions focus on matching the right action to the right phase and knowing when to preserve evidence, when to contain, and when to recover.

๐Ÿ”„
CompTIA's PICERL model โ€” six phases: Preparation โ†’ Identification โ†’ Containment โ†’ Eradication โ†’ Recovery โ†’ Lessons Learned. Every exam scenario action belongs to a specific phase. The most tested traps: Lessons Learned happens after the incident is closed, and evidence must be preserved before containment actions alter the system.
๐Ÿ› ๏ธ
P
Preparation
๐Ÿ”
I
Identification
๐Ÿšง
C
Containment
๐Ÿงน
E
Eradication
โœ…
R
Recovery
๐Ÿ“‹
L
Lessons Learned
๐Ÿ”„
PICERL Phases

The IR Lifecycle

Six sequential phases that structure every incident response effort โ€” from before an incident happens through post-incident improvement.

Preparation: Policies, playbooks, team, training Identification: Detect & classify the incident Containment: Limit damage, preserve evidence Eradication: Remove root cause + malware Recovery: Restore, verify clean, monitor Lessons Learned: Review, document, improve
๐Ÿ”
Detection & Analysis

Find & Understand It

Tools and indicators that surface incidents. SIEM aggregates logs. SOAR automates response. IOCs are the artifacts that fingerprint a compromise.

SIEM: Log aggregation + correlation + alerts SOAR: Automated response workflows IOC: Artifact proving compromise Alert types: TP / FP / TN / FN
๐Ÿšง
Containment & Eradication

Stop It & Remove It

Containment stops the bleeding. Eradication removes the root cause. Evidence must be preserved before containment changes anything on affected systems.

Short-term: Isolate, quarantine, disable accounts Evidence: Preserve before containment Eradication: Remove malware, close vectors Rebuild vs. restore: Decision framework
๐Ÿ”ฌ
Forensics & Communication

Investigate & Report

Digital forensics preserves and analyzes evidence in a legally sound way. Communication ensures the right stakeholders are notified within required timelines.

Order of volatility: RAM first, archives last Chain of custody: Evidence handling trail Playbooks: Step-by-step response guides Notification: Internal, legal, regulators

The SY0-701 IR Mindset

Exam questions present a scenario mid-incident and ask what to do next. The answer always maps to a phase and a specific action. Master the sequence: Preparation (before) โ†’ Identify โ†’ Contain (evidence first!) โ†’ Eradicate โ†’ Recover โ†’ Lessons Learned (after). Anything out of order is wrong.

๐Ÿ’ก
PICERL vs. NIST SP 800-61: NIST's IR lifecycle uses four phases: Preparation โ†’ Detection & Analysis โ†’ Containment/Eradication/Recovery โ†’ Post-Incident Activity. CompTIA's PICERL expands NIST's middle phases into four separate steps and renames "Post-Incident Activity" to "Lessons Learned." Both frameworks are tested โ€” know PICERL as the primary six-phase model for SY0-701.
Take the Quiz โ†’
Deep Dive: Each IR Category

The phases, tools, procedures, and exam traps for incident response on SY0-701.

๐Ÿ”„ PICERL Phases The Lifecycle

Preparation
Everything done before an incident occurs. Develop IR policy and procedures, assemble and train the CSIRT (Computer Security Incident Response Team), build playbooks/runbooks, set up tools (SIEM, SOAR), conduct tabletop exercises, establish communication plans, and define escalation paths. The quality of preparation determines how well all other phases execute.
Before incident ยท Proactive
Identification (Detection)
Recognize that an incident has occurred, classify its type (malware, data breach, insider threat), and determine its scope and priority. Sources: SIEM alerts, IDS/IPS, AV, user reports, threat intelligence feeds. Key questions: What is affected? What data is at risk? Is this a true positive? Document the timeline from first indicator.
Detect ยท Classify ยท Scope
Containment
Short-term containment: Immediately limit damage โ€” isolate systems from the network, disable compromised accounts, block attacker IP addresses. Long-term containment: Maintain operations (patching, temporary workarounds) while the full response plays out. Critical: preserve forensic evidence before making changes.
Short-term + long-term ยท Evidence first
Eradication
Remove all traces of the attacker and close the attack vectors. Actions: malware removal or system rebuild, patch the exploited vulnerability, close the initial access point (phishing link, unpatched port, stolen credential), remove backdoors and persistence mechanisms. Verify eradication is complete before moving to recovery.
Remove root cause ยท Patch ยท Close vectors
Recovery
Restore systems and services to normal operation. Restore from known-clean backups, reimage compromised systems, re-enable previously disabled services. Verify systems are clean before returning to production. Increase monitoring for re-infection or follow-on attacks during the recovery window. Validate business operations are restored.
Restore ยท Verify ยท Monitor
Lessons Learned (Post-Incident)
After the incident is fully closed, convene a post-incident review. Document a complete timeline, root cause, what worked, what didn't, gaps in detection/response. Update playbooks, policies, and controls based on findings. Share findings with stakeholders. The exam frequently asks what happens in Lessons Learned โ€” it's always after recovery, never during.
After incident ยท Review ยท Improve
โš ๏ธ
Phase order is a frequent exam trap: Tabletop exercises = Preparation (before). Isolating a system = Containment. Removing malware = Eradication (not Containment). Restoring from backup = Recovery (not Eradication). Post-incident review = Lessons Learned (not Recovery). Each action maps to exactly one phase โ€” wrong phase = wrong answer.

๐Ÿ” Detection & Analysis Find It

SIEM (Security Information and Event Management)
Aggregates logs from firewalls, IDS/IPS, endpoints, servers, and authentication systems into a central platform. Applies correlation rules to detect patterns across multiple sources. Generates alerts, provides dashboards, and stores logs for compliance and forensic analysis. Examples: Splunk, Microsoft Sentinel, IBM QRadar, ArcSight. The central nervous system of the SOC.
Log aggregation ยท Correlation ยท Alerts
SOAR (Security Orchestration, Automation, and Response)
Automates repetitive response tasks using playbooks. When SIEM generates an alert, SOAR can automatically: enrich the alert with threat intel, query the EDR for process details, isolate the host, create a ticket, and notify the analyst โ€” all without human input. Reduces MTTR (Mean Time to Respond) and prevents analyst fatigue. Complements SIEM; does not replace it.
Automated playbooks ยท Reduces MTTR
IOC โ€” Indicators of Compromise
Specific artifacts that indicate a system has been compromised. Examples: known malware file hashes (SHA-256), malicious IP addresses, C2 domain names, suspicious registry keys, unusual network ports, mutex names. IOCs are reactive โ€” they indicate compromise has already occurred. Shared via STIX/TAXII standards and threat intelligence feeds.
Artifacts ยท Reactive ยท STIX/TAXII
IOA โ€” Indicators of Attack
Behavioral patterns that indicate an attack is in progress โ€” regardless of specific tools used. Examples: unusual process spawning cmd.exe from a web server process, lateral movement patterns, privilege escalation behavior, large outbound data transfers at night. More proactive than IOCs โ€” detect attacks using new tools that have no known IOC signatures.
Behavioral ยท Proactive ยท In-progress
Threat Intelligence
External knowledge about threat actors, TTPs (Tactics, Techniques, and Procedures), and IOCs shared across the security community. Sources: commercial feeds, ISACs (Information Sharing and Analysis Centers), MITRE ATT&CK framework, government feeds (CISA). STIX (Structured Threat Information Expression) = data format. TAXII = transport protocol for sharing STIX data.
STIX/TAXII ยท MITRE ATT&CK ยท ISACs
Alert Classification
True Positive (TP): Real attack, correctly flagged. False Positive (FP): Legitimate activity incorrectly flagged as malicious โ€” causes alert fatigue. True Negative (TN): Safe activity, correctly ignored. False Negative (FN): Real attack that is missed โ€” the most dangerous outcome. High FP rate = alert fatigue. High FN rate = missed attacks.
TP / FP / TN / FN
Alert Classification Matrix
โœ… True Positive
Real threat, correctly detected
Alert fired on an actual attack. The system is working. Respond immediately.
โš ๏ธ False Positive
Legit activity, incorrectly flagged
Causes alert fatigue. Analysts start ignoring alerts. Tune detection rules to reduce.
โœ… True Negative
No threat, correctly silent
Safe activity correctly not flagged. The system is working as expected.
๐Ÿšจ False Negative
Real threat, missed entirely
Most dangerous outcome. Attacker is active but undetected. Improve detection coverage.
โš ๏ธ
SIEM vs. SOAR โ€” the key distinction: SIEM aggregates, correlates, and alerts (it tells you something happened). SOAR responds and automates (it acts on what SIEM found). A SIEM with no SOAR requires a human analyst to investigate and respond manually. SOAR without SIEM has no log data to act on. The exam tests: "which automates the response?" = SOAR. "Which aggregates logs from multiple sources?" = SIEM.

๐Ÿšง Containment & Eradication Stop It & Remove It

Short-Term Containment
Immediate actions to stop the spread of the incident. Network isolation (disconnect from LAN/VLAN quarantine), disable compromised user accounts, block attacker's IP/domain at the firewall, terminate malicious processes. Goal: stop ongoing damage as fast as possible. Systems remain running for forensic evidence collection.
Immediate ยท Isolate ยท Block
Long-Term Containment
Stabilize the environment while full investigation and eradication proceeds. Apply temporary patches, add monitoring/logging on affected systems, implement additional access controls, maintain service continuity where possible. May take days or weeks for large incidents. Bridges the gap between initial isolation and complete eradication.
Stabilize ยท Temporary fixes ยท Continuity
Evidence Preservation
Must happen before containment alters system state. Capture memory (RAM) before powering off. Image the disk before wiping. Document running processes, network connections, and logged-in users. Follow the order of volatility. Once containment actions are taken, volatile evidence is destroyed. Preservation enables legal proceedings and root cause analysis.
โš ๏ธ Before containment ยท RAM ยท Disk image
Eradication Actions
Remove all traces of the attacker from the environment. Malware removal or system rebuild (rebuild preferred for thorough cleaning), patch the exploited vulnerability, revoke and reissue compromised credentials, remove attacker's persistence mechanisms (scheduled tasks, registry keys, backdoor accounts), close or filter the initial attack vector.
Remove malware ยท Patch ยท Close vector
Rebuild vs. Restore Decision
For severely compromised systems: Rebuild from scratch (reimage, reinstall) = cleanest, ensures no persistence. Restore from backup = faster, but the backup must pre-date the compromise โ€” a post-compromise backup is infected. Rule: if you can't be 100% certain the backup is clean, rebuild. Always verify system integrity after restoration before returning to production.
Rebuild = cleanest ยท Backup must pre-date
Recovery Actions
Restore systems and services to full production status after eradication is verified. Re-enable previously isolated systems, restore data from verified clean backups, validate business functions, increase monitoring duration post-recovery (attackers sometimes re-enter quickly). Conduct a final scan before declaring recovery complete. Notify users and stakeholders when normal operations resume.
Restore ยท Validate ยท Heightened monitoring
โš ๏ธ
The most common exam sequence error: Students reverse eradication and recovery, or skip evidence preservation. The correct order is: Contain (with evidence preserved first) โ†’ Eradicate (remove root cause) โ†’ Recover (restore). You cannot recover before eradicating โ€” restoring a system while the malware is still active just reinfects it. You cannot eradicate before containing โ€” the attacker is still live.

๐Ÿ”ฌ Forensics & Communication Investigate & Report

Order of Volatility โ€” Collect Most Volatile First
1
CPU Registers & CacheContents of processor registers, L1/L2/L3 cache. Gone instantly on halt.
Most Volatile
2
RAM (Memory)Running processes, network sockets, encryption keys in memory, live malware. Lost on power-off.
Collect 2nd
3
Network StateActive TCP/UDP connections, ARP cache, routing tables, open sockets. Changes rapidly.
Collect 3rd
4
Running ProcessesProcess list, open file handles, loaded DLLs, parent-child relationships.
Collect 4th
5
Disk StorageFiles, logs stored on disk, browser history, registry. Survives power-off.
Collect 5th
6
Remote Logs & SIEMCentralized log server entries, SIEM records. Already preserved off-system.
Collect 6th
7
Backup / Archive MediaTape backups, cold storage, offline archives. Most durable, least time-sensitive.
Least Volatile
Chain of Custody
A documented, unbroken record of who collected evidence, when, how it was stored, and every person who accessed it from collection through trial. Required for evidence to be admissible in legal proceedings. Any gap in the chain (unexplained access, unsigned handoff) may render evidence inadmissible. Use evidence bags, tamper-evident seals, and signed logs.
Legal admissibility ยท Documentation trail
Forensic Imaging
Create a bit-for-bit (sector-by-sector) copy of storage media before any analysis. Analysis is performed on the copy โ€” never the original. A write blocker is attached to prevent any writes to the original drive during imaging. The image hash (MD5 or SHA-256) is computed before and after to verify the copy is identical. Tools: FTK Imager, dd, Autopsy.
Bit-for-bit copy ยท Write blocker ยท Hash verification
Legal Hold
A directive to preserve all potentially relevant data in anticipation of litigation or regulatory investigation. Overrides normal data retention/deletion policies โ€” data that would normally be purged must be retained. Typically initiated by legal counsel. Organizations must comply immediately upon receiving a litigation hold notice. Failure = spoliation of evidence.
Preserve for litigation ยท Overrides retention
IR Playbooks & Runbooks
Playbook: High-level strategic guide for responding to a specific incident type (e.g., ransomware playbook, phishing playbook). Defines roles, decision points, escalation criteria. Runbook: Step-by-step tactical procedures (click this, run that command). Playbooks are for decision-making; runbooks are for execution. Both are developed during Preparation and updated in Lessons Learned.
Playbook = strategic ยท Runbook = tactical
Stakeholder Communication
Internal: CSIRT, CISO, legal, HR, executive leadership, affected business units. External: Law enforcement (FBI for significant incidents), regulators, affected customers (breach notification laws), media (if public). Timing matters: GDPR requires breach notification to supervisory authority within 72 hours of discovery. US state laws, HIPAA, and PCI DSS have separate notification requirements.
72-hr GDPR ยท Legal ยท Regulators
Tabletop Exercises
A structured discussion-based simulation of an incident scenario โ€” no live systems involved. Participants (CISO, legal, IT, business units) walk through a hypothetical attack (ransomware, data breach) and discuss what they would do at each decision point. Identifies gaps in playbooks, communication, and role assignments. Occurs during Preparation phase. A pen test is active; a tabletop is a discussion.
Preparation phase ยท No live systems ยท Discussion
๐Ÿ’ก
Memory forensics and why RAM matters: RAM often contains artifacts unavailable on disk โ€” running malware code, decrypted encryption keys (including ransomware keys), network connection state, passwords in memory, and injected shellcode in legitimate processes. Fileless malware exists only in memory and never writes to disk โ€” without a RAM capture, it leaves almost no evidence. This is why RAM appears at #2 in the order of volatility.
Side-by-Side Comparison

Filter by category or view all. The exam tests actions mapped to phases โ€” know what belongs where.

Criterion ๐Ÿ”„ PICERL ๐Ÿ” Detection ๐Ÿšง Containment ๐Ÿ”ฌ Forensics
Core Purpose Structure the entire IR effort from before to after the incident Identify that an incident occurred and understand its scope Stop active damage, remove the attacker, and restore operations Preserve, collect, and analyze evidence in a legally sound manner
Key Tools Playbooks, runbooks, tabletop exercises, IR policy SIEM (Splunk, Sentinel), SOAR, EDR, IDS/IPS, threat intel feeds Network isolation, VLAN quarantine, firewall rules, EDR kill switch FTK Imager, Autopsy, Volatility (memory forensics), write blockers
Timing Preparation = before ยท Lessons Learned = after ยท Rest = during Identification phase โ€” as soon as possible after incident begins Containment immediately after identification; Eradication after containment Evidence collection before containment alters system; analysis ongoing
SIEM vs. SOAR Both are Preparation-phase investments; used through Identification SIEM: aggregates + correlates + alerts. SOAR: automates response workflows. SOAR can automate short-term containment (auto-isolate host on alert) SIEM stores logs for forensic analysis and timeline reconstruction
Key Failure Mode Skipping phases or doing them out of order (e.g., recovery before eradication) False negatives โ€” real attacks missed. Alert fatigue from too many false positives. Altering evidence before preservation; restoring before eradication is complete Break in chain of custody; analyzing original media instead of image
Exam Keyword "Tabletop" = Preparation ยท "Remove malware" = Eradication ยท "Post-incident review" = Lessons Learned "Log aggregation" = SIEM ยท "Automated response" = SOAR ยท "File hash/IP match" = IOC ยท "Missed attack" = FN "Isolate/quarantine" = Containment ยท "Remove backdoor/patch" = Eradication ยท "Restore from backup" = Recovery "RAM first" = Order of volatility ยท "Evidence handling trail" = Chain of custody ยท "Pre-trial preservation" = Legal hold
Exam-Style Vignettes

Read each scenario and identify the correct IR action before checking the breakdown.

๐Ÿ”„ PICERLMapping Actions to Phases
"A large retailer conducts an annual review of its incident response procedures. The security team gathers department heads, legal counsel, and IT staff to walk through a simulated ransomware attack. No live systems are touched. Afterward, the team updates the ransomware playbook based on gaps identified. Which PICERL phase covers both of these activities?"
Correct PhasePreparation โ€” both the tabletop exercise (simulation before an incident) and the playbook update happen during the Preparation phase, which covers all proactive IR readiness activities.
Why Not Lessons Learned?Lessons Learned occurs after a real incident is closed โ€” it reviews what happened during an actual event. A tabletop simulates a hypothetical scenario with no real incident.
Key DistinctionTabletop = simulated discussion (Preparation). Post-incident review = after a real incident (Lessons Learned). Both improve playbooks, but they occur in different phases.
Exam Key"Tabletop exercise," "simulation," "no live systems" โ†’ Preparation phase
๐Ÿ” DetectionSIEM vs. SOAR
"A SOC analyst receives notification that their security platform automatically detected a suspicious PowerShell command on an endpoint, queried the threat intelligence feed to confirm it matched a known attack pattern, quarantined the endpoint from the network, opened a ticket, and sent an alert to the on-call engineer โ€” all within 90 seconds of the initial event, without any human intervention."
Technology DescribedSOAR โ€” the automated, orchestrated workflow (detect โ†’ enrich โ†’ contain โ†’ notify) is the defining characteristic of SOAR. No human was involved in any response step.
SIEM's RoleSIEM likely generated the initial alert from log correlation, but SIEM alone cannot automatically quarantine the endpoint or create tickets โ€” that's SOAR's job.
Key MetricSOAR reduces MTTR (Mean Time to Respond) from minutes/hours (human-driven) to seconds (automated). This is its primary value proposition.
Exam Key"Automated response," "no human intervention," "orchestrated workflow" โ†’ SOAR (not SIEM)
๐Ÿšง ContainmentEvidence Before Containment
"A forensic investigator arrives at a scene where a web server has been compromised. The server is still running. The attacker used fileless malware โ€” no executable was written to disk. The investigator needs to capture evidence before the IR team isolates the server. What must the investigator capture first, and why?"
Capture FirstRAM (memory) โ€” fileless malware exists only in memory. The moment the server is isolated (powered off or rebooted), the malware code, C2 connections, and injected shellcode are permanently lost.
Order of VolatilityRAM is #2 on the order of volatility (after CPU registers/cache). Disk can be imaged after. But for fileless malware, RAM is the primary โ€” and often only โ€” evidence source.
Why Not Disk First?Fileless malware leaves no artifacts on disk. Imaging the disk first would find nothing. RAM capture is time-critical because isolation will destroy the evidence.
Exam Key"Fileless malware," "memory-only," "before isolation" โ†’ capture RAM first (order of volatility)
๐Ÿ”ฌ ForensicsChain of Custody
"During an insider threat investigation, a forensic analyst images the suspect's hard drive and stores the image on a shared network drive. A week later, legal counsel requests the image for use in proceedings. The defense attorney challenges the evidence, noting the shared drive has no access logs and multiple people have read/write access. What is the issue?"
The ProblemBroken chain of custody โ€” the evidence was stored in a location with no access logs and unrestricted access. It cannot be proven the image was not altered between collection and use in proceedings.
Correct ProcedureEvidence should be stored in a secured, access-controlled location. Every access must be logged (who, when, why). The image hash (SHA-256) computed at collection should match the hash at presentation.
Legal ImpactA broken chain of custody may cause the evidence to be ruled inadmissible โ€” the entire case could be undermined even if the suspect is guilty.
Exam Key"Uncontrolled access to evidence," "no access logs," "admissibility challenge" โ†’ Chain of custody violation
โš ๏ธ
Top 5 IR exam traps: (1) Tabletop exercise = Preparation, not Lessons Learned. (2) Preserve evidence before containment actions alter system state. (3) Eradication must complete before Recovery begins. (4) SOAR automates response; SIEM aggregates logs โ€” don't confuse them. (5) False Negative = missed real attack (dangerous); False Positive = false alarm (causes alert fatigue).
Practice Quiz

10 scenario-based questions with per-category breakdown โ€” built around actual SY0-701 scenario question patterns.

Question 1 of 10

PICERL
โ€”
Detection
โ€”
Containment
โ€”
Forensics
โ€”
IR Advisor Tool

Describe your IR scenario to identify the correct phase and recommended actions.

Where are you in the incident?
Choose the situation that best matches your current scenario.
What is the immediate priority?
Have you captured forensic evidence yet?
What stage of investigation?
Memory Hooks & Mnemonics

Click each card to flip it and reveal the mnemonic.

๐Ÿ‘† Tap a card to flip

๐Ÿ”„
PICERL
What do the 6 letters stand for?
Please โ€” I โ€” Can โ€” Eat โ€” Ripe โ€” Lemons
Preparation ยท Identification ยท Containment ยท Eradication ยท Recovery ยท Lessons Learned. Every action in an incident maps to one of these six phases. Wrong phase = wrong exam answer.
๐Ÿ“‹
Phase Order Trap
What are the two most-tested phase mistakes?
Tabletop = Preparation. Post-review = Lessons Learned.
Tabletop exercises happen BEFORE an incident (Preparation). Post-incident reviews happen AFTER recovery (Lessons Learned). Never swap these. Recovery always comes before Lessons Learned.
๐Ÿ”
SIEM vs SOAR
Which detects, which responds?
SIEM = Sees It. SOAR = Stops It.
SIEM aggregates logs and generates alerts โ€” it tells you something happened. SOAR automates the response โ€” it acts on what SIEM found. "Automated, no human" = SOAR. "Log aggregation, correlation" = SIEM.
โš ๏ธ
False Positive vs Negative
Which is worse โ€” FP or FN?
FP = Crying Wolf (annoying). FN = Missing the Attack (dangerous).
False Positive = real activity flagged as threat โ†’ alert fatigue. False Negative = real attack not flagged โ†’ attacker operates undetected. FN is the more dangerous failure. Anomaly-based = more FP. Signature-based = more FN for new attacks.
๐Ÿง 
Order of Volatility
What's collected first and why?
RAM before disk. Most volatile first, always.
CPU cache โ†’ RAM โ†’ Network state โ†’ Running processes โ†’ Disk โ†’ Remote logs โ†’ Archives. RAM is lost on power-off. Fileless malware lives ONLY in RAM. Capture memory before isolating the system โ€” isolation may require a reboot.
โš–๏ธ
Chain of Custody
Why does chain of custody matter?
"No gap = admissible. Any gap = inadmissible."
Chain of custody = documented trail of who handled evidence and when. Any unaccounted gap (unlogged access, missing signature) can make evidence inadmissible in court. Always use write blockers, tamper seals, and signed logs.
๐Ÿ›ก๏ธ
Evidence First
When do you preserve evidence vs. contain?
"Preserve, THEN contain."
Evidence preservation must happen BEFORE containment alters the system. Isolating a server (rebooting, network disconnect) destroys RAM contents. Image first โ€” then isolate. The exam will try to get you to isolate first. Always preserve evidence before making changes.
๐Ÿงน
Eradication vs Recovery
What's the difference and which comes first?
Eradicate = remove. Recover = restore. Never recover before eradicating.
Eradication removes malware, patches vulnerabilities, closes attack vectors. Recovery restores services from clean backups. Restoring a system before eradication is complete = reinfection. Eradicate first, verify clean, then recover.

SY0-701 Quick-Recall Cheat Sheet

If the exam saysโ€ฆKey detailAnswer
"Tabletop exercise," "simulation before an incident"No live systems, discussion-basedPreparation Phase
"Post-incident review," "what worked, what didn't"After incident is closedLessons Learned Phase
"Classify the incident," "scope, what data is at risk"First active phaseIdentification Phase
"Isolate from network," "quarantine," "disable account"Limit spreadContainment Phase
"Remove malware," "patch vulnerability," "close backdoor"Root cause removalEradication Phase
"Restore from backup," "return to normal operations"After eradication completeRecovery Phase
"Log aggregation," "correlation rules," "central alerts dashboard"Multiple log sourcesSIEM
"Automated response," "no human intervention," "playbook workflow"Reduces MTTRSOAR
"File hash match," "known malicious IP," "C2 domain"Reactive artifactsIOC
"Missed real attack," "attacker undetected"Most dangerous alert failureFalse Negative (FN)
"Alert fatigue," "legitimate activity flagged as threat"Too many false alarmsFalse Positive (FP)
"RAM first," "capture before power-off," "fileless malware"Lost on rebootOrder of Volatility
"Preserve before containment," "image before isolation"Evidence before changesEvidence Preservation
"Who handled evidence," "admissibility," "documented trail"Unbroken recordChain of Custody
"Preserve for litigation," "overrides deletion policy"Legal directiveLegal Hold
๐ŸŽ“ Security+ Exam Prep Platform

Ready to Pass Security+?
Get Everything You Need in One Place.

These concept pages are just the start. FlashGenius gives you a complete Security+ prep toolkit โ€” practice tests, flashcard decks, domain cheat sheets, and scenario quizzes built for SY0-701.

๐ŸŽฏ Practice Tests
๐Ÿƒ Flashcard Decks
๐Ÿ“„ Domain Cheat Sheets
๐Ÿ“Š Scenario Quizzes
๐Ÿง  Memory Hooks
๐Ÿ” All 5 Domains
๐Ÿš€ Start Free on FlashGenius View All Security+ Resources โ†’
Free to register ยท No credit card required ยท Trusted by Security+ candidates