EC-Council: Computer Hacking Forensic Investigator(CHFI-V10)
Module 8 : Network Forensics
         
Questions available : 133 You are not logged in.
Please Login for track your learning progress
   
 
Q. No: 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 |
Go to Question No.



Question No 0


If you want to share the link of this question, please click here to "Copy Question Link" and share that generated link. Link from URL may change in future.
 

   
Bookmark this Question
QID: 669  
   
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their various activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?


 
A:    The manufacturer of the system compromised
 
B:    The logic, formatting and elegance of the code used in the attack
C:    The nature of the attack
 
D:    The vulnerability exploited in the incident
 
         

 
 

Diffence opinion in Correct Answer or any comment?
Vote / Comment for correct Answer



Comunity Comments:

Banwari on 21/05/2025
Opted Answer: C
The nature of the attack: understanding the attack type —provides crucial insights into the hacker’s methods, motivations, and skill level.
Additionally, analyzing the logic, formatting, and elegance of the code used in the attack can further refine the profile by revealing the attacker‘s technical expertise and possible affiliations.

yassine on 10/07/2024
Opted Answer: C
Why not C

Admin on 09/04/2025
Yes. More accurate option is C, So Answer Choice Updated.

1. Nature of the Attack
2. logic or code used in the attack

















WELCOME TO ONLINE EXAM PREPARATION SYSTEM

Certification Examinations