exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 334 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 334
Topic #: 1
[All 312-50v11 Questions]

Which among the following is the best example of the hacking concept called "clearing tracks"?

  • A. An attacker gains access to a server through an exploitable vulnerability.
  • B. During a cyberattack, a hacker injects a rootkit into a server.
  • C. After a system is breached, a hacker creates a backdoor to allow re-entry into a system.
  • D. During a cyberattack, a hacker corrupts the event logs on all machines.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Shin_Frankie
11 months, 1 week ago
Selected Answer: D
clear log process
upvoted 1 times
...
Osen
2 years, 2 months ago
Correct. Clearing Track: An intelligent hacker always clears all evidence so that in the later point of time, no one will find any traces leading to him. This involves modifying/corrupting/deleting the values of Logs, modifying registry values and uninstalling all applications he used and deleting all folders he created
upvoted 4 times
...
jinjection
2 years, 3 months ago
Correct
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...