This is a tricky one, but I think the key is focusing on the hacker's goal of altering or deleting the logs. That points to the "covering tracks" phase, so I'm going with A.
I feel pretty confident about this one. Deleting audit logs is a classic way for hackers to cover their tracks, so the answer has to be A. Covering tracks.
Okay, let me walk through this step-by-step. The hacker is trying to cover up their activity, so it has to be in the "covering tracks" phase. A is the clear answer here.
I'm a bit confused by the wording of the options. I'll need to double-check my understanding of open-source licensing and development before selecting an answer.
Sherly
5 months agoCassi
5 months agoZoila
5 months agoOlen
6 months agoKiera
6 months agoElvera
6 months agoCarisa
6 months agoJeannetta
6 months agoBrice
6 months agoAdolph
6 months agoDetra
6 months agoUna
6 months agoGoldie
7 months agoFelix
7 months agoLonna
7 months agoGail
11 months agoEttie
9 months agoViki
10 months agoMauricio
10 months agoLynette
11 months agoMalcom
11 months agoVelda
10 months agoElden
10 months agoLauna
11 months agoCarin
1 year agoRene
10 months agoClarinda
10 months agoJerry
10 months agoChantay
10 months agoKelvin
10 months agoEttie
11 months agoHillary
11 months agoJosefa
1 year agoVivan
11 months agoDeonna
11 months agoOra
11 months agoVirgie
11 months agoProvidencia
12 months agoTanja
1 year agoChanel
1 year agoMel
1 year agoMalcolm
1 year ago