Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 13 Topic 2 Discussion

ECCouncil Computer Hacking Forensic Investigator (CHFIv11) 312-49v11 Question # 13 Topic 2 Discussion

312-49v11 Exam Topic 2 Question 13 Discussion:
Question #: 13
Topic #: 2

During a cyber espionage investigation at a defense contractor in Washington, D.C., forensic analysts used shared intelligence feeds to pinpoint unusual network beacons matching known adversary tactics, enabling them to trace the intrusion back to specific command-and-control servers and validate the scope of data exfiltration. Which role of threat intelligence in computer forensics is primarily demonstrated in this scenario?


A.

Identifies the threats at the early stage


B.

Discovers the indicators of compromise for further investigation


C.

Provides appropriate guidance throughout the forensic investigation process


D.

Recognizes and correlates the known attack patterns


Get Premium 312-49v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.