This is a tricky one, but I think the key is focusing on the hacker's goal of altering or deleting the logs. That points to the "covering tracks" phase, so I'm going with A.
I feel pretty confident about this one. Deleting audit logs is a classic way for hackers to cover their tracks, so the answer has to be A. Covering tracks.
Okay, let me walk through this step-by-step. The hacker is trying to cover up their activity, so it has to be in the "covering tracks" phase. A is the clear answer here.
I'm a bit confused by the wording of the options. I'll need to double-check my understanding of open-source licensing and development before selecting an answer.
Sherly
3 months agoCassi
3 months agoZoila
4 months agoOlen
4 months agoKiera
4 months agoElvera
4 months agoCarisa
5 months agoJeannetta
5 months agoBrice
5 months agoAdolph
5 months agoDetra
5 months agoUna
5 months agoGoldie
5 months agoFelix
5 months agoLonna
5 months agoGail
10 months agoEttie
8 months agoViki
8 months agoMauricio
8 months agoLynette
9 months agoMalcom
10 months agoVelda
8 months agoElden
9 months agoLauna
9 months agoCarin
10 months agoRene
8 months agoClarinda
8 months agoJerry
9 months agoChantay
9 months agoKelvin
9 months agoEttie
10 months agoHillary
10 months agoJosefa
11 months agoVivan
9 months agoDeonna
10 months agoOra
10 months agoVirgie
10 months agoProvidencia
10 months agoTanja
11 months agoChanel
11 months agoMel
11 months agoMalcolm
11 months ago