Master the six PICERL phases, SIEM/SOAR, indicators of compromise, containment strategies, order of volatility, and chain of custody โ with scenario-based quizzes and an IR advisor tool built for SY0-701.
๐ฏ Take the Practice QuizDomain 4 (Security Operations) is 28% of the SY0-701 exam. Incident response questions focus on matching the right action to the right phase and knowing when to preserve evidence, when to contain, and when to recover.
Six sequential phases that structure every incident response effort โ from before an incident happens through post-incident improvement.
Tools and indicators that surface incidents. SIEM aggregates logs. SOAR automates response. IOCs are the artifacts that fingerprint a compromise.
Containment stops the bleeding. Eradication removes the root cause. Evidence must be preserved before containment changes anything on affected systems.
Digital forensics preserves and analyzes evidence in a legally sound way. Communication ensures the right stakeholders are notified within required timelines.
Exam questions present a scenario mid-incident and ask what to do next. The answer always maps to a phase and a specific action. Master the sequence: Preparation (before) โ Identify โ Contain (evidence first!) โ Eradicate โ Recover โ Lessons Learned (after). Anything out of order is wrong.
The phases, tools, procedures, and exam traps for incident response on SY0-701.
Filter by category or view all. The exam tests actions mapped to phases โ know what belongs where.
| Criterion | ๐ PICERL | ๐ Detection | ๐ง Containment | ๐ฌ Forensics |
|---|---|---|---|---|
| Core Purpose | Structure the entire IR effort from before to after the incident | Identify that an incident occurred and understand its scope | Stop active damage, remove the attacker, and restore operations | Preserve, collect, and analyze evidence in a legally sound manner |
| Key Tools | Playbooks, runbooks, tabletop exercises, IR policy | SIEM (Splunk, Sentinel), SOAR, EDR, IDS/IPS, threat intel feeds | Network isolation, VLAN quarantine, firewall rules, EDR kill switch | FTK Imager, Autopsy, Volatility (memory forensics), write blockers |
| Timing | Preparation = before ยท Lessons Learned = after ยท Rest = during | Identification phase โ as soon as possible after incident begins | Containment immediately after identification; Eradication after containment | Evidence collection before containment alters system; analysis ongoing |
| SIEM vs. SOAR | Both are Preparation-phase investments; used through Identification | SIEM: aggregates + correlates + alerts. SOAR: automates response workflows. | SOAR can automate short-term containment (auto-isolate host on alert) | SIEM stores logs for forensic analysis and timeline reconstruction |
| Key Failure Mode | Skipping phases or doing them out of order (e.g., recovery before eradication) | False negatives โ real attacks missed. Alert fatigue from too many false positives. | Altering evidence before preservation; restoring before eradication is complete | Break in chain of custody; analyzing original media instead of image |
| Exam Keyword | "Tabletop" = Preparation ยท "Remove malware" = Eradication ยท "Post-incident review" = Lessons Learned | "Log aggregation" = SIEM ยท "Automated response" = SOAR ยท "File hash/IP match" = IOC ยท "Missed attack" = FN | "Isolate/quarantine" = Containment ยท "Remove backdoor/patch" = Eradication ยท "Restore from backup" = Recovery | "RAM first" = Order of volatility ยท "Evidence handling trail" = Chain of custody ยท "Pre-trial preservation" = Legal hold |
Read each scenario and identify the correct IR action before checking the breakdown.
10 scenario-based questions with per-category breakdown โ built around actual SY0-701 scenario question patterns.
Describe your IR scenario to identify the correct phase and recommended actions.
Click each card to flip it and reveal the mnemonic.
๐ Tap a card to flip
| If the exam saysโฆ | Key detail | Answer |
|---|---|---|
| "Tabletop exercise," "simulation before an incident" | No live systems, discussion-based | Preparation Phase |
| "Post-incident review," "what worked, what didn't" | After incident is closed | Lessons Learned Phase |
| "Classify the incident," "scope, what data is at risk" | First active phase | Identification Phase |
| "Isolate from network," "quarantine," "disable account" | Limit spread | Containment Phase |
| "Remove malware," "patch vulnerability," "close backdoor" | Root cause removal | Eradication Phase |
| "Restore from backup," "return to normal operations" | After eradication complete | Recovery Phase |
| "Log aggregation," "correlation rules," "central alerts dashboard" | Multiple log sources | SIEM |
| "Automated response," "no human intervention," "playbook workflow" | Reduces MTTR | SOAR |
| "File hash match," "known malicious IP," "C2 domain" | Reactive artifacts | IOC |
| "Missed real attack," "attacker undetected" | Most dangerous alert failure | False Negative (FN) |
| "Alert fatigue," "legitimate activity flagged as threat" | Too many false alarms | False Positive (FP) |
| "RAM first," "capture before power-off," "fileless malware" | Lost on reboot | Order of Volatility |
| "Preserve before containment," "image before isolation" | Evidence before changes | Evidence Preservation |
| "Who handled evidence," "admissibility," "documented trail" | Unbroken record | Chain of Custody |
| "Preserve for litigation," "overrides deletion policy" | Legal directive | Legal Hold |