exam questions

Exam 312-49v10 All Questions

View all questions & answers for the 312-49v10 exam

Exam 312-49v10 topic 1 question 112 discussion

Actual exam question from ECCouncil's 312-49v10
Question #: 112
Topic #: 1
[All 312-49v10 Questions]

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

  • A. The manufacturer of the system compromised
  • B. The logic, formatting and elegance of the code used in the attack
  • C. The nature of the attack
  • D. The vulnerability exploited in the incident
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
044f354
6 months ago
Selected Answer: B
B. The logic, formatting and elegance of the code used in the attack The style and characteristics of the attacker's code can reveal unique patterns or behaviors that help identify the perpetrator. A. The manufacturer of the system compromised: Incorrect. This provides no relevant information about the attacker’s identity or methods. C. The nature of the attack: Incorrect. While helpful for understanding the incident, it doesn’t directly aid in profiling the perpetrator. D. The vulnerability exploited in the incident: Incorrect. This indicates how the attack was performed but does not provide specific clues about the attacker.
upvoted 3 times
...
Toni222
10 months, 3 weeks ago
Selected Answer: C
Understanding the nature of the attack provides critical insights into how the compromise occurred, what methods the hacker used, and potentially what their motives and capabilities might be. This information helps in constructing a profile of the incident, which includes details such as the attack vector, techniques employed, and the potential goals of the attacker. While the other options (A, B, and D) might provide additional context or details relevant to the investigation, they are generally secondary to understanding the specific nature and characteristics of the attack itself.
upvoted 1 times
...
Dumas
11 months, 4 weeks ago
C Nature of the attack. What the attacker is trying achieve?
upvoted 1 times
...
vcloudpmp
3 years, 2 months ago
C or D
upvoted 1 times
BarryMacockener
2 years, 7 months ago
No, it's definitely B. Criminal profiling is used to determine what kind of person you are dealing with... their experience, intelligence, thought processes, etc. B is the best answer for this.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...