Answer:
Attackers can attempt to manipulate logs by manipulating the server to modify or delete log entries to hide their activities.
Attackers can attempt to manipulate logs by manipulating the server to modify or delete log entries to hide their activities.
You may be interested in:
Web Security MCQs - PART 2