Exam4Training

Which among the following is the best example of the hacking concept called "clearing tracks"?

Which among the following is the best example of the hacking concept called "clearing tracks"?
A . After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
B . During a cyberattack, a hacker injects a rootkit into a server.
C . An attacker gains access to a server through an exploitable vulnerability.
D . During a cyberattack, a hacker corrupts the event logs on all machines.

Answer: A

Exit mobile version