nerdexam
EC-CouncilEC-Council

212-82 · Question #45

212-82 Question #45: Real Exam Question with Answer & Explanation

Sign in or unlock 212-82 to reveal the answer and full explanation for question #45. The question stem and answer options stay visible for context.

Submitted by katya_ua· Mar 6, 2026Cloud Security Operations & Incident Response

Question

As a cybersecurity technician, you were assigned to analyze the file system of a Linux image captured from a device that has been attacked recently. Study the forensic image 'Evidenced.img" in the Documents folder of the "Attacker Machine-1" and identify a user from the image file. (Practical Question)

Options

  • Asmith
  • Battacker
  • Croger
  • Djohn

Unlock 212-82 to see the answer

You've previewed enough free 212-82 questions. Unlock 212-82 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Digital forensics#Linux forensics#File system analysis#Incident response
Full 212-82 PracticeBrowse All 212-82 Questions