An outside operator seeks to move logs to a public note repository while lowering the chance of detection. Which approach is most effective at limiting traces once the data is uploaded?
Incorporate the information as extra lines within a large source code post on a widely visited developer site
Upload plain text files to an online forum that retains a searchable archive of every document
Move all files directly to an external server using default user authentication with no data isolation
Break the logs into several parts, place them on a short-lifetime web repository with a passcode, and safely track the access links
Dividing data and limiting how long it is kept on a platform can disrupt forensic analysis. Other options either store information in plain view or retain it for longer periods, inviting potential discovery.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is breaking logs into several parts an effective approach?
Open an interactive chat with Bash
What is a short-lifetime web repository, and why is it important here?
Open an interactive chat with Bash
How does tracking the access links improve operational security?