in Education by
In _______ phase, the hackers try to hide their footprints. (a) Scanning (b) Tracks clearing (c) Reconnaissance (d) Gaining access This question was addressed to me in quiz. My enquiry is from Generic Steps for Security in portion Cyber Security of Cyber Security Select the correct answer from above options Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,

1 Answer

0 votes
by
 
Best answer
The correct choice is (b) Tracks clearing To explain I would say: Tracks clearing or covering tracks is the name of the phase where the hackers delete logs of their existence & other activity records they do during the hacking process. This step is actually an unethical one.

Related questions

0 votes
0 votes
0 votes
    _______ is the oldest phone hacking techniques used by hackers to make free calls (a) Phishing (b) Spamming (c) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Governments hired some highly skilled hackers. These types of hackers are termed as _______ (a) Special Hackers (b) ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Network administrators can create their own ACL rules based on _______ ________ and _______ (a) Address, Protocols and ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    A ______ can hide a user's browsing activity. (a) Firewall (b) Antivirus (c) Incognito mode (d) VPN This ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
0 votes
    _____________ is hiding of data within data, where we can hide images, text, and other messages within ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    In which year computer scientists try to integrate encryption techniques in TCP/IP protocol? (a) 1978 (b) 1980 (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    What is the one thing that old hackers were fond of or find interests in? (a) Breaking Other's system (b) ... Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    What is the name of the first hacker's conference? (a) DEFCON (b) OSCON (c) DEVCON (d) SECCON I have been ... , Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
...