A. Covering tracks
Explanation:
Covering tracks is the phase in which a hacker attempts to erase or alter evidence of their activities, such as modifying or deleting system audit logs. This is done to avoid detection after the compromise of the system.
Why the other answers are incorrect:
B. Expanding access: Involves the hacker escalating privileges or moving laterally across systems, not removing traces of their activities.
C. Gaining persistence: Involves ensuring continued access to the compromised system, such as installing backdoors, not modifying audit logs.
D. Performing reconnaissance: This is the information-gathering phase, where the attacker gathers data about the system or network, not covering up their tracks.
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
044f354
1 month, 3 weeks ago