New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIH Exam - Topic 4 Question 13 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 13
Topic #: 4
[All GCIH Questions]

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Bernadine
3 months ago
I thought it was C at first, but B is spot on.
upvoted 0 times
...
Dalene
3 months ago
Wait, altering logs? That sounds super risky!
upvoted 0 times
...
Tegan
3 months ago
B makes the most sense, altering logs is classic cover-up.
upvoted 0 times
...
Sonia
4 months ago
I think it's A, maintaining access is key too.
upvoted 0 times
...
Leoma
4 months ago
Definitely B, covering tracks is all about hiding your tracks.
upvoted 0 times
...
Ming
4 months ago
I’m a bit confused; I thought "Gaining access" was more about the initial breach, but I guess altering logs fits with "Covering tracks."
upvoted 0 times
...
Carlee
4 months ago
I feel like "Maintaining access" could also be relevant, but I agree that altering logs is more about covering up the intrusion.
upvoted 0 times
...
German
4 months ago
I remember practicing a similar question, and I think "Covering tracks" is definitely the right answer since it involves deleting or modifying logs.
upvoted 0 times
...
Dorian
5 months ago
I think altering log files is about hiding what you've done, so it might be "Covering tracks," but I'm not entirely sure.
upvoted 0 times
...
Leota
5 months ago
This question is testing our understanding of the hacking process. Altering the log files is a classic way for an attacker to cover their tracks, so I'm going with option B.
upvoted 0 times
...
Gregg
5 months ago
I'm a little confused on this one. Is altering the log files considered part of maintaining access or covering tracks? I'll have to review my notes to be sure.
upvoted 0 times
...
Dorian
5 months ago
Okay, I know this is about the steps of a malicious hacking attack. Altering the log files is definitely part of covering the attacker's tracks, so I'm confident B is the right answer.
upvoted 0 times
...
Beth
5 months ago
Hmm, I'm a bit unsure about this one. Covering tracks could involve other steps too, like deleting evidence. I'll have to think this through carefully.
upvoted 0 times
...
Kasandra
5 months ago
This one seems straightforward. Altering the log files is clearly a way for the attacker to cover their tracks, so I'll go with option B.
upvoted 0 times
...
Talia
5 months ago
I'm a little fuzzy on the details of the theory of constraints, to be honest. But based on what I remember, I think the key is identifying constraints and managing them to boost overall system performance. So I'll probably go with either smooth workflow or lowered inventory levels as the best answer here.
upvoted 0 times
...
Scot
5 months ago
Let me think this through step-by-step. I know EM Express is for managing a single database, so option A is likely false. The other options seem plausible, but I'll double-check my understanding before answering.
upvoted 0 times
...
Kate
5 months ago
Okay, let's see. An increase in sales and a decrease in accounts receivable investment - that points to option B, the average collection period has decreased.
upvoted 0 times
...
Rodrigo
5 months ago
Okay, this one seems straightforward. The question is asking about the type of measure that involves stopping the possible consequences of a security incident. Based on that, I'm going to go with option D, Preventive.
upvoted 0 times
...
Tish
9 months ago
Elementary, my dear Watson! The culprit's tracks are as clear as day. Option B, covering the evidence, is the only logical choice.
upvoted 0 times
...
Teri
9 months ago
John must be a real DIY kind of guy, hacking servers and redecorating the logs. A true interior designer, this one.
upvoted 0 times
Vanesa
8 months ago
B) Covering tracks
upvoted 0 times
...
Daniela
8 months ago
C) Gaining access
upvoted 0 times
...
Albert
8 months ago
B) Covering tracks
upvoted 0 times
...
Phyliss
8 months ago
A) Maintaining access
upvoted 0 times
...
...
Erasmo
9 months ago
Hmm, let's see... Accessing the server illegally? Check. Placing a backdoor? Check. Altering the logs? Yup, that's gotta be Option B, covering tracks.
upvoted 0 times
...
Virgie
10 months ago
I bet John's a real charmer, hacking into servers and all. But hey, at least he's keeping those logs nice and tidy with option B!
upvoted 0 times
...
Stephaine
10 months ago
Gotta love how these hackers are always trying to cover their digital footprints. Option B is the way to go, no doubt about it.
upvoted 0 times
Ora
8 months ago
C) Gaining access
upvoted 0 times
...
Vince
8 months ago
B) Covering tracks
upvoted 0 times
...
Erick
9 months ago
A) Maintaining access
upvoted 0 times
...
...
Paola
10 months ago
Altering the log files definitely sounds like a way to cover your tracks. Option B seems like the correct answer here.
upvoted 0 times
Whitley
8 months ago
Reconnaissance is the first step in the hacking process, gaining access comes after that.
upvoted 0 times
...
Olga
9 months ago
Maintaining access is also crucial for them to continue their unauthorized activities.
upvoted 0 times
...
Bettina
9 months ago
Yes, it's important for malicious attackers to cover their tracks to avoid detection.
upvoted 0 times
...
Brett
10 months ago
I agree, altering the log files is definitely a way to cover your tracks.
upvoted 0 times
...
...
Tammy
11 months ago
I'm not sure, but I think it could also be A) Maintaining access. By altering the log files, the attacker could ensure continued access to the server.
upvoted 0 times
...
Jarvis
11 months ago
I agree with Rupert. Altering the server log files is definitely about covering tracks.
upvoted 0 times
...
Rupert
11 months ago
I think the answer is B) Covering tracks.
upvoted 0 times
...

Save Cancel