New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus CFR-410 Exam - Topic 9 Question 48 Discussion

Actual exam question for CertNexus's CFR-410 exam
Question #: 48
Topic #: 9
[All CFR-410 Questions]

If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Sherly
3 months ago
Seems too obvious, but I guess it fits.
upvoted 0 times
...
Cassi
3 months ago
I agree, it's all about hiding their traces.
upvoted 0 times
...
Zoila
4 months ago
Wait, are you sure? What about gaining persistence?
upvoted 0 times
...
Olen
4 months ago
Yeah, that makes sense.
upvoted 0 times
...
Kiera
4 months ago
Definitely covering tracks!
upvoted 0 times
...
Elvera
4 months ago
I feel like this is a straightforward one—it's definitely covering tracks, but I could see how someone might confuse it with expanding access.
upvoted 0 times
...
Carisa
5 months ago
Covering tracks sounds right, but I wonder if it could also relate to gaining persistence somehow?
upvoted 0 times
...
Jeannetta
5 months ago
I remember a practice question about this, and I think it was also related to hiding evidence after an attack.
upvoted 0 times
...
Brice
5 months ago
I think altering audit logs is definitely about covering tracks, but I'm not 100% sure.
upvoted 0 times
...
Adolph
5 months ago
This is a tricky one, but I think the key is focusing on the hacker's goal of altering or deleting the logs. That points to the "covering tracks" phase, so I'm going with A.
upvoted 0 times
...
Detra
5 months ago
I feel pretty confident about this one. Deleting audit logs is a classic way for hackers to cover their tracks, so the answer has to be A. Covering tracks.
upvoted 0 times
...
Una
5 months ago
Okay, let me walk through this step-by-step. The hacker is trying to cover up their activity, so it has to be in the "covering tracks" phase. A is the clear answer here.
upvoted 0 times
...
Goldie
5 months ago
This one seems pretty straightforward. Altering or deleting audit logs is all about covering your tracks, so the answer has to be A.
upvoted 0 times
...
Felix
5 months ago
Hmm, I'm not totally sure about this one. Could it be expanding access or gaining persistence as well? I'll have to think it through a bit more.
upvoted 0 times
...
Lonna
5 months ago
I'm a bit confused by the wording of the options. I'll need to double-check my understanding of open-source licensing and development before selecting an answer.
upvoted 0 times
...
Gail
10 months ago
Ah, the classic 'clean up after yourself' approach. Why don't they just own up to their misdeeds like a grown-up hacker?
upvoted 0 times
Ettie
8 months ago
D) Performing reconnaissance
upvoted 0 times
...
Viki
8 months ago
C) Gaining persistence
upvoted 0 times
...
Mauricio
8 months ago
B) Expanding access
upvoted 0 times
...
Lynette
9 months ago
A) Covering tracks
upvoted 0 times
...
...
Malcom
10 months ago
Deleting system audit logs? That's a bold move, Cotton. Let's see if it pays off for them.
upvoted 0 times
Velda
8 months ago
C) Gaining persistence
upvoted 0 times
...
Elden
9 months ago
B) Expanding access
upvoted 0 times
...
Launa
9 months ago
A) Covering tracks
upvoted 0 times
...
...
Carin
10 months ago
Covering tracks, huh? Sounds like someone's trying to cover their digital footprints. Better luck next time!
upvoted 0 times
Rene
8 months ago
C) Gaining persistence
upvoted 0 times
...
Clarinda
8 months ago
Exactly, trying to hide their actions.
upvoted 0 times
...
Jerry
9 months ago
A) Covering tracks
upvoted 0 times
...
Chantay
9 months ago
No, not trying to get in further.
upvoted 0 times
...
Kelvin
9 months ago
B) Expanding access
upvoted 0 times
...
Ettie
10 months ago
Yeah, trying to erase their trail.
upvoted 0 times
...
Hillary
10 months ago
A) Covering tracks
upvoted 0 times
...
...
Josefa
11 months ago
Ah, the old 'delete the evidence' trick. Nice try, but we're on to you, buddy.
upvoted 0 times
Vivan
9 months ago
Ah, the old 'delete the evidence' trick. Nice try, but we're on to you, buddy.
upvoted 0 times
...
Deonna
10 months ago
D) Performing reconnaissance
upvoted 0 times
...
Ora
10 months ago
C) Gaining persistence
upvoted 0 times
...
Virgie
10 months ago
B) Expanding access
upvoted 0 times
...
Providencia
10 months ago
A) Covering tracks
upvoted 0 times
...
...
Tanja
11 months ago
Hmm, trying to cover up their tracks, eh? Sneaky hacker, but we've got their number!
upvoted 0 times
...
Chanel
11 months ago
But could it also be gaining persistence? I mean, they are trying to hide their tracks to stay undetected.
upvoted 0 times
...
Mel
11 months ago
I agree with Malcolm, altering or deleting audit logs is definitely covering tracks.
upvoted 0 times
...
Malcolm
11 months ago
I think the hacker is involved in covering tracks.
upvoted 0 times
...

Save Cancel