what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?

After an attacker has successfully compromised a remote computer, what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?

After an attacker has successfully compromised a remote computer, what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?

A.
Install pactehs

B.
Setup a backdoor

C.
Cover your tracks

D.
Install a zombie for DDOS

Explanation:
As a hacker you don’t want to leave any traces that could lead back to you.



Leave a Reply 0

Your email address will not be published. Required fields are marked *