ExamGecko
Question list
Search
Search

Related questions











Question 482 - 312-50v12 discussion

Report
Export

Which among the following is the best example of the hacking concept called "clearing tracks"?

A.
After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
Answers
A.
After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
B.
During a cyberattack, a hacker injects a rootkit into a server.
Answers
B.
During a cyberattack, a hacker injects a rootkit into a server.
C.
An attacker gains access to a server through an exploitable vulnerability.
Answers
C.
An attacker gains access to a server through an exploitable vulnerability.
D.
During a cyberattack, a hacker corrupts the event logs on all machines.
Answers
D.
During a cyberattack, a hacker corrupts the event logs on all machines.
Suggested answer: D
asked 18/09/2024
maria rocio ucha paz
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first