An attacker wants to make changes to a log file to clear his tracks. Instead of erasing the logs, he just makes changes to some of the entries. What is he trying to do?
A) Throw off the timeline to confuse the investigator
B) Create the appearance of decoy traffic
C) Make an extremely unusual event so it wouldn't be looked at
D) Taunt the administrators
Correct Answer:
Verified
Q8: Which of the following types of hosts
Q9: Hosts can often be attacked in layers.
Q10: Another way to describe risk is:
A) A
Q11: Which of the following is considered to
Q12: When attackers have gained and then maintained
Q14: If a White Hat researcher discovers a
Q15: Someone downloads a tool from the Internet
Q16: What is the threshold for the amount
Q17: Which of the following statutes says that
Q18: Which of the following statements are most
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents