exam questions

Exam SY0-501 All Questions

View all questions & answers for the SY0-501 exam

Exam SY0-501 topic 1 question 121 discussion

Actual exam question from CompTIA's SY0-501
Question #: 121
Topic #: 1
[All SY0-501 Questions]

After an identified security breach, an analyst is tasked to initiate the IR process. Which of the following is the NEXT step the analyst should take?

  • A. Recovery
  • B. Identification
  • C. Preparation
  • D. Documentation
  • E. Escalation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mad
Highly Voted 5 years, 6 months ago
6 STEPS OF INCIDENT RESPONSE Preparation Detection & Identification Containment Remediation Recovery Lessons Learned (Documentation) Ergo, from available options being presented, Recovery is the next step...
upvoted 21 times
HackerJoe
4 years, 5 months ago
The diagram at this link helps illustrate what mad is explaining. After Detection, Containment, Eradication and Recovery are really all grouped together as the "next step". https://www.infocyte.com/blog/2019/10/02/ir-planning-the-critical-6-steps-of-cyber-security-incident-response/
upvoted 1 times
...
gomuogmu
4 years, 2 months ago
Preparation Detection & Identification Containment Eradication (not remediation that would be the same shit as recovery) Recovery Lessons Learned
upvoted 4 times
...
...
Stefanvangent
Highly Voted 5 years, 2 months ago
So, in Gibson's book it says this: "Identification is the first step after hearing about a potential incident to verify it is an incident." page 144
upvoted 17 times
...
ms230000751
Most Recent 3 years, 4 months ago
Anther case of COMPTIA's moronic wording of questions. Seriously, after identifying the problem, we need to identify it? I get that its the first step but the way they have worded this deliberately implies that the identification phase is already complete. This is why I am always nervous to take COMPTIA exams. It's not the content, its the trick questions.
upvoted 6 times
Moanzino
3 years, 4 months ago
I agree dude, but least we know, good luck with the exam I'm taking mine tuesdat!
upvoted 1 times
...
...
opayemim
3 years, 4 months ago
Identification is correct. The phases of of incident response are: Prepare, Identification, Containment, Eradicate, Recovery and Lessons Learned. The process was to be initiated, Preparation is as straightforward as having a trained team/someone to respond which is the analyst in this case. so the next phase will be Identification which may include identifying the depth of the breach.
upvoted 1 times
...
CyberDog
3 years, 5 months ago
Identification has been done, next step considering the other options given would be Recovery. I hope people read these discussions.
upvoted 2 times
...
JRA3420
3 years, 5 months ago
These questions are so idiotically worded. It specifically says this should be the next step AFTER IDENTIFICATION of a problem, and then the answer is identification and not recovery?!? C'mon man
upvoted 3 times
...
lara7123
3 years, 6 months ago
After an identified security breach. I think RECOVERY because indentification is already done
upvoted 2 times
...
AntonioTech
3 years, 7 months ago
Why B since the security breach has already been identified?
upvoted 1 times
...
Thalonz
3 years, 8 months ago
I don't really like that way that this question formulated. "After an identified security breach," is stated in the beginning, which implies to me that the identify step has already occurred. However, the answer is A. because they want you to show that you understand the steps. I think its not clear what they want, and selecting A. is redundant even if it is correct.
upvoted 6 times
...
Aarongreene
3 years, 9 months ago
my gibson book is on page 493 ... the first step in the incident response process is preparation. After identifying incident, personnel attempt to contain or isolate the problem.
upvoted 1 times
iamwill
3 years, 8 months ago
aren't you "always" in the preparation phase?
upvoted 1 times
...
...
who__cares123456789___
3 years, 11 months ago
You have A breach...now determine the EXACT type of Breach!! IS it APT? Is it Malware...you MUST determine the EXACT type of breach....if I am arrested for a felony, dont you need to identify exactly what I done? Probably took Twisted Tea to the head of some exam prepper for missing obvious easy questions...
upvoted 4 times
...
MichaelLangdon
4 years ago
This is exactly what the test is all about. word salad to trip u up and doubt yourself. IR process hasn’t been initiated yet, on the test it’ll be identification. Rlly wish these questions went thru more scrutiny.
upvoted 4 times
...
WillGTechDaily
4 years ago
keyword is "initiate" which means start or begin ,
upvoted 3 times
ekinzaghi
3 years, 5 months ago
meaning the answer should be C since preparation is the first step in IR
upvoted 1 times
...
...
Hanzero
4 years, 2 months ago
Analyst has yet to initialize IR process so identification is correct.
upvoted 2 times
addyp1999
4 years, 1 month ago
shouldn't it be preparation then? I seriously do not get the wording. People are accepting the answer B but it's hard to swallow.
upvoted 1 times
...
...
mhpmyt7
4 years, 4 months ago
Although the question might seem to be worded terribly, it is a typical Comptia question whose aim is to confuse. However, the question stated clearly that the analyst was tasked to INITIATE the IR process. The keyword here is INITIATE. It never said the analyst identified the breach. Someone else might have identified the breach but when the task is assigned to the analyst, following the IR process, the next step for the Analyst would be IDENTIFICATION - From the moment you become aware that an incident has occurred, it’s important to answer a few crucial questions before doing anything else. What kind of incident has occurred? Has any data been leaked or lost? What is the level of severity? This will help you choose the best course of action according to your incident response process. The main emphasis of this phase is on detecting and reporting any potential security threats. So the answer is correct! https://resources.infosecinstitute.com/category/certifications-training/securityplus/sec-domains/risk-management-in-security/incident-response-procedures/#:~:text=Incident%20response%20is%20not%20a,cover%20the%20following%20six%20steps.
upvoted 1 times
ekinzaghi
3 years, 5 months ago
how can it be so when the first step of IR is preparation?
upvoted 2 times
...
...
Owonikoko
4 years, 5 months ago
In an organization, when an incident is suspected or even identified and then an analyst is asked to carry out the IR process. He will have to start all over by himself to confirm that truly there is an incident and what to do next after receiving the information is to get prepared. This question simply indicates that an information was passed across to him to act on. So getting prepared is the next step to take.
upvoted 2 times
...
Jasonbelt
4 years, 5 months ago
The fact that it say "initiate the IR plan", should mean that it is starting it. Identifying a breach doesn't mean you have identified the issue, just that you know something happened.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago