Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?
What tool would be best used to have the LM hashes computed for all possible permutations of the administrator password?
How can an attacker disguise his buffer overflow attack signature such that there is a greater probability of his attack going undetected by the IDS?