Understand incident phases, training, testing, root cause analysis, threat hunting, and evidence handling for Security+.
Incident-response questions on Security+ are about workflow discipline under pressure. The exam wants you to know what happens first, what should be preserved, and how training, tabletop exercises, threat hunting, and lessons learned improve the next response instead of only the current one.
Chain of custody: The documented record of who handled evidence, when they handled it, and how it was transferred or stored.
Order of volatility: The idea that the most fragile evidence should be captured first because it disappears fastest.
CompTIA is usually checking whether you can do three things under pressure:
flowchart LR
A["Preparation"] --> B["Identification"]
B --> C["Containment"]
C --> D["Eradication"]
D --> E["Recovery"]
E --> F["Lessons learned"]
What to notice:
| Source | Why it matters |
|---|---|
| CPU cache and registers | disappears immediately |
| Memory | highly transient but often rich in attacker artifacts |
| Local disk | more durable but still can be altered by active response |
| Remote logs and centralized telemetry | useful for correlation and may outlive host compromise |
| Archived or backup sources | helpful later, but usually not the first volatile source to capture |
1case_id: IR-2026-041
2item: laptop-014 memory image
3collected_by: j.singh
4time_utc: "2026-03-28T14:42:00Z"
5hash_sha256: "<computed-hash>"
6transferred_to: m.ortega
7reason: malware investigation
What to notice:
| If the scenario is really about… | Best first focus |
|---|---|
| malware actively spreading | containment and communication control |
| preserving evidence for a legal or formal review | careful collection and chain of custody |
| understanding whether similar compromise exists elsewhere | threat hunting |
| reducing the chance of repeat failure after recovery | root cause analysis and lessons learned |
Security+ also expects you to separate:
These activities overlap, but they are not interchangeable.
A workstation used by finance shows signs of active malware beaconing, and legal counsel has already asked the security team to preserve evidence because customer records may be involved. Which response is strongest first?
A. Reimage the workstation immediately so the user can resume work
B. Contain the workstation from the network, preserve relevant volatile and system evidence as safely as possible, and document handling before deeper eradication steps
C. Delete suspicious files manually and skip documentation to save time
D. Wait for the next scheduled tabletop exercise before acting
Best answer: B. The strongest answer balances urgent containment with evidence preservation and documented handling.
Continue with 4.9 Data Sources & Investigations to connect incident workflow to the evidence and telemetry analysts actually use.