List of questions
Related questions
Question 21 - PT0-003 discussion
During a security assessment, a penetration tester gains access to an internal server and manipulates some data to hide its presence. Which of the following is the best way for the penetration tester to hide the activities performed?
A.
Clear the Windows event logs.
B.
Modify the system time.
C.
Alter the log permissions.
D.
Reduce the log retention settings.
Your answer:
0 comments
Sorted by
Leave a comment first