If a hacker is attempting to alter or delete system audit logs, in which of the following attack phases is the hacker involved?
Limited Time Offer
25%
Off
Malcolm
3 hours ago