GIAC Security Leadership Certification (GSLC) GSLC Question # 47 Topic 5 Discussion

GIAC Security Leadership Certification (GSLC) GSLC Question # 47 Topic 5 Discussion

GSLC Exam Topic 5 Question 47 Discussion:
Question #: 47
Topic #: 5

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?


A.

Reconnaissance


B.

Maintaining access


C.

Covering tracks


D.

Gaining access


Get Premium GSLC Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.