EC-CouncilEC-Council
212-82 · Question #45
212-82 Question #45: Real Exam Question with Answer & Explanation
Sign in or unlock 212-82 to reveal the answer and full explanation for question #45. The question stem and answer options stay visible for context.
Submitted by katya_ua· Mar 6, 2026Cloud Security Operations & Incident Response
Question
As a cybersecurity technician, you were assigned to analyze the file system of a Linux image captured from a device that has been attacked recently. Study the forensic image 'Evidenced.img" in the Documents folder of the "Attacker Machine-1" and identify a user from the image file. (Practical Question)
Options
- Asmith
- Battacker
- Croger
- Djohn
Unlock 212-82 to see the answer
You've previewed enough free 212-82 questions. Unlock 212-82 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Digital forensics#Linux forensics#File system analysis#Incident response