Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam CFR-410 Topic 9 Question 48 Discussion

Actual exam question for CertNexus's CFR-410 exam
Question #: 48
Topic #: 9
[All CFR-410 Questions]

If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Carin
3 days ago
Covering tracks, huh? Sounds like someone's trying to cover their digital footprints. Better luck next time!
upvoted 0 times
...
Josefa
9 days ago
Ah, the old 'delete the evidence' trick. Nice try, but we're on to you, buddy.
upvoted 0 times
...
Tanja
12 days ago
Hmm, trying to cover up their tracks, eh? Sneaky hacker, but we've got their number!
upvoted 0 times
...
Chanel
14 days ago
But could it also be gaining persistence? I mean, they are trying to hide their tracks to stay undetected.
upvoted 0 times
...
Mel
17 days ago
I agree with Malcolm, altering or deleting audit logs is definitely covering tracks.
upvoted 0 times
...
Malcolm
21 days ago
I think the hacker is involved in covering tracks.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77