nerdexam
EC-CouncilEC-Council

312-49 · Question #272

312-49 Question #272: Real Exam Question with Answer & Explanation

Sign in or unlock 312-49 to reveal the answer and full explanation for question #272. The question stem and answer options stay visible for context.

Submitted by cyberguy42· Apr 18, 2026Malware Forensics

Question

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

Options

  • AThe manufacturer of the system compromised
  • BThe logic, formatting and elegance of the code used in the attack
  • CThe nature of the attack
  • DThe vulnerability exploited in the incident

Unlock 312-49 to see the answer

You've previewed enough free 312-49 questions. Unlock 312-49 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Forensic profiling#Attacker attribution#Code analysis#Malicious code characteristics
Full 312-49 PracticeBrowse All 312-49 Questions