SecurityA+

Incident Response for CompTIA A+ 220-1102

Incident response provides a structured approach to handling security events. CompTIA A+ 220-1102 tests the incident response process, chain of custody, evidence preservation, and an A+ technician's role in a security incident. This guide covers every incident response concept in the A+ Core 2 objectives.

8
4 sections · 8 exam key points
1 practice questions

Incident Response Phases

The NIST incident response lifecycle has four phases: Preparation: establish incident response policy, procedures, team (CSIRT), tools, and communication channels before incidents occur. Train staff on recognizing and reporting incidents. Detection and Analysis: identify that an incident is occurring. Sources: SIEM alerts, user reports, antivirus notifications, IDS/IPS alerts, anomalous network traffic. Analyze to determine scope, affected systems, type of incident (malware, data breach, unauthorized access). Containment, Eradication, and Recovery: Containment: stop the spread (isolate systems, block network paths). Short-term containment: immediate stop to prevent further damage. Long-term containment: maintain limited operations while evidence is preserved and eradication planned. Eradication: remove the threat (malware removal, account cleanup, patch vulnerabilities). Recovery: restore systems to normal operation and verify no threats remain. Post-Incident Activity: document the incident fully, analyze root cause, improve defenses, update procedures.

A+ Technician's Role in Incidents

A+ technicians are often the first to discover or be notified of a security incident. Key responsibilities: Recognize incident indicators: unusual system behavior, malware alerts, user reports of account lockout or data access issues. First responder actions: do NOT power off the system (destroys volatile memory evidence unless forensic memory capture is in progress). Do NOT run antivirus scan immediately (may overwrite evidence). Isolate: disconnect from network (remove Ethernet cable, disable Wi-Fi). Preserve: do not delete any files. Report: immediately notify security team, supervisor, or incident response hotline per policy. Document: note what you observed, when, and what actions you took. Chain of custody: document who handled evidence, when, how — maintains legal admissibility. Limit access: only authorized personnel handle the incident system. Your role ends at containment and notification — deeper investigation is for security analysts and forensic specialists.

Evidence Preservation and Chain of Custody

Chain of custody: legal concept ensuring that evidence is collected, stored, and handled in a way that preserves its integrity and admissibility in court. Each step must be documented: who collected evidence, when, where, how stored, who it was transferred to. Forensic imaging: bit-for-bit copy of a drive using specialized tools (dd, FTK Imager). Do NOT use the original drive for analysis — work from the forensic image. Write blocker: hardware device that prevents any writes to the original drive during imaging. File hashes: hash (MD5, SHA-256) the original drive and the forensic copy — if they match, the copy is identical. Volatile vs non-volatile evidence: volatile evidence (RAM contents, network connections, running processes) is lost when the system powers off — capture first if forensics are needed. Non-volatile evidence (disk, logs, configuration files) persists after power off. Evidence storage: locked physical storage or encrypted digital storage. Log access to evidence storage.

Common Security Incidents

Data breach: unauthorized access to sensitive information. Response: contain, assess scope, notify affected parties and regulators per legal requirements (HIPAA 60 days, GDPR 72 hours). Ransomware: file encryption + ransom demand. Response: isolate immediately, do not pay, assess backup status, contact incident response team, report to law enforcement. Malware infection: any malware on systems. Response: isolate, preserve evidence, run forensics or proceed with malware removal per IR plan. Unauthorized access: someone accessing systems without authorization. Response: disable compromised accounts, preserve logs, review what was accessed, notify legal/HR if internal. DDoS: service unavailable due to traffic flood. Response: notify ISP, enable DDoS mitigation (scrubbing, rate limiting), document. Insider threat: current or former employee abusing access. Response: immediately revoke access, preserve evidence before alerting the subject, involve HR and legal.

Key exam facts — A+

  • NIST incident response phases: Preparation → Detection/Analysis → Containment/Eradication/Recovery → Post-Incident
  • First response: isolate from network; do NOT power off (destroys volatile evidence)
  • Chain of custody: documents every person who touched evidence — required for legal proceedings
  • Forensic image: bit-for-bit copy of drive using write blocker — work from image, not original
  • Report immediately: A+ technician's role is identify, contain, notify — not investigate
  • Ransomware: isolate, do not pay, restore from backup, report to law enforcement
  • Data breach notification: HIPAA 60 days, GDPR 72 hours to supervisory authority
  • Hash the original evidence: verify forensic image integrity with MD5 or SHA-256

Common exam traps

Practice questions — Incident Response

These questions are representative of what you will see on A+ exams. The correct answer and explanation are shown immediately below each question.

Q1.

A.A. Power off the computer immediately to stop the data transfer
B.B. Run a full antivirus scan to remove the malware
C.C. Disconnect the workstation from the network and notify the security team
D.D. Reimage the workstation from the last known good backup

Explanation: Isolating the machine from the network stops the ongoing data exfiltration without destroying volatile memory evidence. Powering off destroys evidence. Running antivirus may overwrite forensic artifacts. Reimaging is a later remediation step — incident response comes first.

Frequently asked questions — Incident Response

What is chain of custody and why does it matter?

Chain of custody is the documentation trail that records who collected evidence, how it was collected, how it was stored, and who had access to it at every point. It matters because if evidence is ever used in a legal proceeding, the defense can challenge evidence that was not properly handled (potentially contaminated, modified, or fabricated). Proper chain of custody ensures the evidence is admissible and credible in court.

Practice this topic

Test yourself on Incident Response

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics