Question that I found interesting:
Microsoft's STRIDE threat assessment framework uses six categories for threats: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. If a penetration tester is able to modify audit logs, what STRIDE categories best describe this issue?
A#Tampering and information disclosure
B#Elevation of privilege and tampering
C#Repudiation and denial of service
D#Repudiation and tampering