Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity.
After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?
A . The manufacturer of the system compromised
B . The logic, formatting and elegance of the code used in the attack
C . The nature of the attack
D . The vulnerability exploited in the incident
Answer: B
Latest 312-49v9 Dumps Valid Version with 547 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund