After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity.
After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?
A . The manufacturer of the system compromised
B . The logic, formatting and elegance of the code used in the attack
C . The nature of the attack
D . The vulnerability exploited in the incident
Answer: B
Latest 312-49v9 Dumps Valid Version with 547 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
                             Subscribe
                            
                        
                                            
                             Login                        
                    
                        0 Comments                    
                                        
                     Inline Feedbacks                    
                    View all comments