Which among the following is the best example of the hacking concept called "clearing tracks"?
A . After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
B . During a cyberattack, a hacker injects a rootkit into a server.
C . An attacker gains access to a server through an exploitable vulnerability.
D . During a cyberattack, a hacker corrupts the event logs on all machines.
Answer: A
Latest 312-50v11 Dumps Valid Version with 432 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund