Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Completing an attack requires covering the tracks showing that you were there. Which of the following is NOT one of the actions typically performed by an attacker to cover the tracks?
Deleting log files
Planting additional tools
Replacing system files
Adding log files
The correct response is adding log files. Usually, the opposite happens: an attacker would destroy system or security log files to eliminate the evidence of their presence and/or prevent discovering the changes made to the system during the attack.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.