Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GCIH Topic 4 Question 13 Discussion

Actual exam question for GIAC's GCIH exam
Question #: 13
Topic #: 4
[All GCIH Questions]

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Tammy
3 days ago
I'm not sure, but I think it could also be A) Maintaining access. By altering the log files, the attacker could ensure continued access to the server.
upvoted 0 times
...
Jarvis
6 days ago
I agree with Rupert. Altering the server log files is definitely about covering tracks.
upvoted 0 times
...
Rupert
7 days ago
I think the answer is B) Covering tracks.
upvoted 0 times
...

Save Cancel