An attacker has successfully compromised a remote computer. Which of the following comes as
one of the last steps that should be taken to ensure that the compromise cannot be traced back to
the source of the problem?
A.
Install patches
B.
Setup a backdoor
C.
Install a zombie for DDOS
D.
Cover your tracks