If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?

If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?
A . Covering tracks
B. Expanding access
C. Gaining persistence
D. Performing reconnaissance

Answer: A

Explanation:

Reference: https://resources.infosecinstitute.com/category/certifications-training/ethical-hacking/covering- tracks/log-tampering-101/#gref

Latest CFR-410 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments