After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity.

After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?
A . The manufacturer of the system compromised
B . The logic, formatting and elegance of the code used in the attack
C . The nature of the attack
D . The vulnerability exploited in the incident

Answer: B

Latest 312-49v9 Dumps Valid Version with 547 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments