Covering Tracks Practice
Understand how attackers attempt to hide activity and why these techniques are sensitive in professional testing.
1. Question
Which activity MOST clearly represents 'covering tracks' during an intrusion?
2. Question
Why is covering tracks generally restricted or heavily controlled in professional engagements?
3. Question
If log tampering is explicitly in scope, what is the MOST responsible way to approach it?
4. Question
Which log source is MOST likely to reveal attempts to cover tracks on a Linux server?
5. Question
From a defender’s perspective, which control MOST helps detect attempts to cover tracks?
6. Question
An attacker clears the Windows Event Logs after an engagement. Which statement is MOST accurate in a professional context?
7. Question
Which of the following is an example of 'log minimization' instead of full log deletion?
8. Question
Why is it important to explain covering tracks techniques to clients even if you do NOT perform them?
9. Question
Which behavior is MOST suspicious from a covering tracks perspective on a database server?
10. Question
In a pentest, if you observe that logs are trivially modifiable by low-privilege users, what is the BEST way to report this?