Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of
Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer. After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting. for (( i = 0;i<11;i++ )); do
dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done
Which of the following actions does Adam want to perform by the above command?
- A: Making a bit stream copy of the entire hard disk for later download.
- B: Deleting all log files present on the system.
- C: Wiping the contents of the hard disk with zeros.
- D: Infecting the hard disk with polymorphic virus strings.