EC-CouncilEC-Council
312-50V12 · Question #117
312-50V12 Question #117: Real Exam Question with Answer & Explanation
Sign in or unlock 312-50V12 to reveal the answer and full explanation for question #117. The question stem and answer options stay visible for context.
Submitted by tunde_lagos· Mar 4, 2026System Hacking Phases and Attack Techniques
Question
Which among the following is the best example of the hacking concept called "clearing tracks"?
Options
- AAfter a system is breached, a hacker creates a backdoor to allow re-entry into a system.
- BDuring a cyberattack, a hacker injects a rootkit into a server.
- CAn attacker gains access to a server through an exploitable vulnerability.
- DDuring a cyberattack, a hacker corrupts the event logs on all machines.
Unlock 312-50V12 to see the answer
You've previewed enough free 312-50V12 questions. Unlock 312-50V12 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Clearing tracks#Post-exploitation#Anti-forensics#System hacking