In _______ phase, the hackers try to hide their footprints.
(a) Scanning
(b) Tracks clearing
(c) Reconnaissance
(d) Gaining access
This question was addressed to me in quiz.
My enquiry is from Generic Steps for Security in portion Cyber Security of Cyber Security