PrepAway - Latest Free Exam Questions & Answers

Tag: After an attacker has successfully compromised a remote computer what would be one of the last steps that would be taken to ensure that the compromise is not traced back to the source of the problem?