312-49 Exam QuestionsBrowse all questions from this exam

312-49 Exam - Question 57


Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

Show Answer
Correct Answer: B

When profiling an incident with the goal of identifying the perpetrator, analyzing the logic, formatting, and elegance of the code used in the attack is essential. This information can provide significant insights into the attacker's skills, experience, and typical coding practices, allowing investigators to gauge the sophistication level of the attacker and potentially connect the incident to other known attacks or individuals. The manufacturer of the compromised system, the nature of the attack, and the specific vulnerability exploited, while important for understanding the technical aspects of the incident, are less critical for creating a detailed profile of the hacker themselves.

Discussion

3 comments
Sign in to comment
larajorgeOption: B
Apr 23, 2021

B is correct

cncOption: D
Oct 2, 2020

D is correct answer

Bennoli13Option: B
Jun 13, 2024

B. The logic, formatting and elegance of the code used in the attack The code used by the attacker can provide significant insights into their skills, experience, and potentially their identity. Analyzing the logic, formatting, and elegance of the code can help investigators understand the attacker's level of sophistication, their typical coding practices, and potentially link the attack to other known incidents or individuals. While the nature of the attack and the vulnerability exploited are also important, they are more focused on the technical details of the attack rather than the profile of the attacker. The manufacturer's identity of the compromised system is the least relevant for profiling the attacker.