Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?
What is the most efficient way an attacker located in remote location to infect this banking Trojan on a victim’s machine?