Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 4 Question 13 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 13
Topic #: 4
[All GCIH Questions]

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Tish
1 months ago
Elementary, my dear Watson! The culprit's tracks are as clear as day. Option B, covering the evidence, is the only logical choice.
upvoted 0 times
...
Teri
1 months ago
John must be a real DIY kind of guy, hacking servers and redecorating the logs. A true interior designer, this one.
upvoted 0 times
Albert
4 days ago
B) Covering tracks
upvoted 0 times
...
Phyliss
9 days ago
A) Maintaining access
upvoted 0 times
...
...
Erasmo
1 months ago
Hmm, let's see... Accessing the server illegally? Check. Placing a backdoor? Check. Altering the logs? Yup, that's gotta be Option B, covering tracks.
upvoted 0 times
...
Virgie
1 months ago
I bet John's a real charmer, hacking into servers and all. But hey, at least he's keeping those logs nice and tidy with option B!
upvoted 0 times
...
Stephaine
1 months ago
Gotta love how these hackers are always trying to cover their digital footprints. Option B is the way to go, no doubt about it.
upvoted 0 times
Vince
5 days ago
B) Covering tracks
upvoted 0 times
...
Erick
22 days ago
A) Maintaining access
upvoted 0 times
...
...
Paola
2 months ago
Altering the log files definitely sounds like a way to cover your tracks. Option B seems like the correct answer here.
upvoted 0 times
Whitley
4 days ago
Reconnaissance is the first step in the hacking process, gaining access comes after that.
upvoted 0 times
...
Olga
15 days ago
Maintaining access is also crucial for them to continue their unauthorized activities.
upvoted 0 times
...
Bettina
27 days ago
Yes, it's important for malicious attackers to cover their tracks to avoid detection.
upvoted 0 times
...
Brett
2 months ago
I agree, altering the log files is definitely a way to cover your tracks.
upvoted 0 times
...
...
Tammy
3 months ago
I'm not sure, but I think it could also be A) Maintaining access. By altering the log files, the attacker could ensure continued access to the server.
upvoted 0 times
...
Jarvis
3 months ago
I agree with Rupert. Altering the server log files is definitely about covering tracks.
upvoted 0 times
...
Rupert
3 months ago
I think the answer is B) Covering tracks.
upvoted 0 times
...

Save Cancel