Final answer:
Event log attacks include log injection, log tampering, and log scraping.
Step-by-step explanation:
There are several event log attacks that don't delete the whole log.
One example is log injection, where an attacker inserts malicious entries into the log to manipulate the system or hide their activities. Another example is log tampering, where the attacker modifies or deletes specific log entries to cover their tracks.
Lastly, there is log scraping, where an attacker accesses the log data without deleting it, allowing them to gather sensitive information or gain unauthorized access to the system.