Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?

An attacker has successfully compromised a remote computer. Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?

An attacker has successfully compromised a remote computer. Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?

A.
Install patches

B.
Setup a backdoor

C.
Install a zombie for DDOS

D.
Cover your tracks

Explanation:
As a hacker you don’t want to leave any traces that could lead back to you.



Leave a Reply 0

Your email address will not be published. Required fields are marked *