FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A HACKER

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Deleting entire logs is the best way to cover your tracks
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -They need to erase and hide the evidence of their achievement. This means deleting logs, and hiding files and processes. This step is somewhat an extension of the maintaining access phase, as covering tracks helps avoid detection, which in turn helps maintain access.

Detailed explanation-2: -Covering Tracks Tools Track-covering tools help the attacker to scrub up all the tracks of computer and online networks activities on the pc . They free cache space, delete cookies, clear Internet history, shared temporary files, delete logs, and discard junk.

There is 1 question to complete.