Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CFR-310 All Questions

View all questions & answers for the CFR-310 exam

Exam CFR-310 topic 1 question 32 discussion

Actual exam question from CertNexus's CFR-310
Question #: 32
Topic #: 1
[All CFR-310 Questions]

If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?

  • A. Covering tracks
  • B. Expanding access
  • C. Gaining persistence
  • D. Performing reconnaissance
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
044f354
1 month, 3 weeks ago
Selected Answer: A
A. Covering tracks Explanation: Covering tracks is the phase in which a hacker attempts to erase or alter evidence of their activities, such as modifying or deleting system audit logs. This is done to avoid detection after the compromise of the system. Why the other answers are incorrect: B. Expanding access: Involves the hacker escalating privileges or moving laterally across systems, not removing traces of their activities. C. Gaining persistence: Involves ensuring continued access to the compromised system, such as installing backdoors, not modifying audit logs. D. Performing reconnaissance: This is the information-gathering phase, where the attacker gathers data about the system or network, not covering up their tracks.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...