GIAC Certified Incident Handler GCIH Question # 34 Topic 4 Discussion

GIAC Certified Incident Handler GCIH Question # 34 Topic 4 Discussion

GCIH Exam Topic 4 Question 34 Discussion:
Question #: 34
Topic #: 4

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?


A.

Maintaining access


B.

Covering tracks


C.

Gaining access


D.

Reconnaissance


Get Premium GCIH Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.