Which among the following is the best example of the hacking concept called "clearing tracks"?

Which among the following is the best example of the hacking concept called "clearing tracks"?
A . After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
B . During a cyberattack, a hacker injects a rootkit into a server.
C . An attacker gains access to a server through an exploitable vulnerability.
D . During a cyberattack, a hacker corrupts the event logs on all machines.

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments