Covering Tracks Practice

Understand how attackers attempt to hide activity and why these techniques are sensitive in professional testing.

1. Question

Which activity MOST clearly represents 'covering tracks' during an intrusion?

2. Question

Why is covering tracks generally restricted or heavily controlled in professional engagements?

3. Question

If log tampering is explicitly in scope, what is the MOST responsible way to approach it?

4. Question

Which log source is MOST likely to reveal attempts to cover tracks on a Linux server?

5. Question

From a defender’s perspective, which control MOST helps detect attempts to cover tracks?

6. Question

An attacker clears the Windows Event Logs after an engagement. Which statement is MOST accurate in a professional context?

7. Question

Which of the following is an example of 'log minimization' instead of full log deletion?

8. Question

Why is it important to explain covering tracks techniques to clients even if you do NOT perform them?

9. Question

Which behavior is MOST suspicious from a covering tracks perspective on a database server?

10. Question

In a pentest, if you observe that logs are trivially modifiable by low-privilege users, what is the BEST way to report this?

Score: 0.0 / 10 (0 of 10 correct)