what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?
"Testing the network using the same methodologies and tools employed by attackers" Identify the correct terminology that defines the above statement.