Hackers engage in a series of activities when breaking into and compromising a computer network or system. In this stage of an attack, the hacker deletes or modifies logs and disguises any malicious software that was used to gain access to the system:
a. Information Gathering
b. Covering their tracks
c. Creating back doors
d. Initial attack
b. Covering their tracks
You might also like to view...
Through 1960, both President John F. Kennedy and his younger brother Robert relentlessly investigated some of the most powerful mob bosses in the United States, including Jimmy Hoffa
a. True b. False
Electronic monitoring systems have the ability to limit an offender's movements to appropriate areas.
Answer the following statement true (T) or false (F)
_________ refers to a defendant who gets very close to committing the intended crime.
a. Substantial step b. Dangerous proximity c. Mere preparation d. Last act
The proper labeling of a group is __________ in the sense that it often involves a power struggle between different racial and ethnic groups
a. controversial c. political b. difficult d. confrontational