nerdexam
EC-CouncilEC-Council

212-82 · Question #60

212-82 Question #60: Real Exam Question with Answer & Explanation

Sign in or unlock 212-82 to reveal the answer and full explanation for question #60. The question stem and answer options stay visible for context.

Submitted by manish99· Mar 6, 2026Cloud Security Operations & Incident Response

Question

Finley, a security professional at an organization, was tasked with monitoring the organizational network behavior through the SIEM dashboard. While monitoring, Finley noticed suspicious activities in the network; thus, he captured and analyzed a single network packet to determine whether the signature included malicious patterns. Identify the attack signature analysis technique employed by Finley in this scenario.

Options

  • AContext-based signature analysis
  • BAtomic-signature-based analysis
  • CComposite signature-based analysis
  • DContent-based signature analysis

Unlock 212-82 to see the answer

You've previewed enough free 212-82 questions. Unlock 212-82 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#signature analysis#network security monitoring#IDS/IPS
Full 212-82 PracticeBrowse All 212-82 Questions