Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CertNexus Exam CFR-410 Topic 9 Question 48 Discussion

Actual exam question for CertNexus's CFR-410 exam
Question #: 48
Topic #: 9
[All CFR-410 Questions]

If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Gail
2 days ago
Ah, the classic 'clean up after yourself' approach. Why don't they just own up to their misdeeds like a grown-up hacker?
upvoted 0 times
...
Malcom
4 days ago
Deleting system audit logs? That's a bold move, Cotton. Let's see if it pays off for them.
upvoted 0 times
...
Carin
25 days ago
Covering tracks, huh? Sounds like someone's trying to cover their digital footprints. Better luck next time!
upvoted 0 times
Ettie
4 days ago
Yeah, trying to erase their trail.
upvoted 0 times
...
Hillary
6 days ago
A) Covering tracks
upvoted 0 times
...
...
Josefa
1 months ago
Ah, the old 'delete the evidence' trick. Nice try, but we're on to you, buddy.
upvoted 0 times
Ora
22 hours ago
C) Gaining persistence
upvoted 0 times
...
Virgie
3 days ago
B) Expanding access
upvoted 0 times
...
Providencia
18 days ago
A) Covering tracks
upvoted 0 times
...
...
Tanja
1 months ago
Hmm, trying to cover up their tracks, eh? Sneaky hacker, but we've got their number!
upvoted 0 times
...
Chanel
1 months ago
But could it also be gaining persistence? I mean, they are trying to hide their tracks to stay undetected.
upvoted 0 times
...
Mel
1 months ago
I agree with Malcolm, altering or deleting audit logs is definitely covering tracks.
upvoted 0 times
...
Malcolm
1 months ago
I think the hacker is involved in covering tracks.
upvoted 0 times
...

Save Cancel
a