EC-CouncilEC-Council
312-49 · Question #272
312-49 Question #272: Real Exam Question with Answer & Explanation
Sign in or unlock 312-49 to reveal the answer and full explanation for question #272. The question stem and answer options stay visible for context.
Submitted by cyberguy42· Apr 18, 2026Malware Forensics
Question
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?
Options
- AThe manufacturer of the system compromised
- BThe logic, formatting and elegance of the code used in the attack
- CThe nature of the attack
- DThe vulnerability exploited in the incident
Unlock 312-49 to see the answer
You've previewed enough free 312-49 questions. Unlock 312-49 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Forensic profiling#Attacker attribution#Code analysis#Malicious code characteristics