List of questions
Related questions
Question 482 - 312-50v12 discussion
Which among the following is the best example of the hacking concept called "clearing tracks"?
A.
After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
B.
During a cyberattack, a hacker injects a rootkit into a server.
C.
An attacker gains access to a server through an exploitable vulnerability.
D.
During a cyberattack, a hacker corrupts the event logs on all machines.
Your answer:
0 comments
Sorted by
Leave a comment first