nerdexam
EC-CouncilEC-Council

312-49 · Question #44

312-49 Question #44: Real Exam Question with Answer & Explanation

Sign in or unlock 312-49 to reveal the answer and full explanation for question #44. The question stem and answer options stay visible for context.

Submitted by tyler.j· Apr 18, 2026Computer Forensics Investigation Process

Question

Computer security logs contain information about the events occurring within an organization's systems and networks. Application and Web server log files are useful in detecting web attacks. The source, nature, and time of the attack can be determined by _________of the compromised system.

Options

  • AAnalyzing log files
  • BAnalyzing SAM file
  • CAnalyzing rainbow tables
  • DAnalyzing hard disk boot records

Unlock 312-49 to see the answer

You've previewed enough free 312-49 questions. Unlock 312-49 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Log analysis#Web server logs#Incident detection#Digital evidence
Full 312-49 PracticeBrowse All 312-49 Questions