John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?
Paola
6 days agoTammy
22 days agoJarvis
25 days agoRupert
26 days ago