PrepAway - Latest Free Exam Questions & Answers

what would be one of the last steps that would be taken to ensure that the compromise is not traced back to th

After an attacker has successfully compromised a remote computer, what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?

PrepAway - Latest Free Exam Questions & Answers

A.
Install pactehs

B.
Setup a backdoor

C.
Cover your tracks

D.
Install a zombie for DDOS

Explanation:
As a hacker you don’t want to leave any traces that could lead back to you.


Leave a Reply