ECCouncil 312-49v11 Question Answer
During a cyber espionage investigation at a defense contractor in Washington, D.C., forensic analysts used shared intelligence feeds to pinpoint unusual network beacons matching known adversary tactics, enabling them to trace the intrusion back to specific command-and-control servers and validate the scope of data exfiltration. Which role of threat intelligence in computer forensics is primarily demonstrated in this scenario?
ECCouncil 312-49v11 Summary
- Vendor: ECCouncil
- Product: 312-49v11
- Update on: May 14, 2026
- Questions: 443

