Which among the following is the best example of the hacking concept called "clearing tracks"?
After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
During a cyberattack, a hacker injects a rootkit into a server.
An attacker gains access to a server through an exploitable vulnerability.
During a cyberattack, a hacker corrupts the event logs on all machines.
Submit