121k views
5 votes
a malicious person is performing a technique called anti-forensics on a target network to hide evidence of an intrusion and conceal implanted rootkits and other malware. what is one action that might be taken when this method is used?

User Kand
by
4.0k points

1 Answer

7 votes

Answer:

Overwriting metadata

Step-by-step explanation:

This is because the most appropriate technique that the attacker uses in a anti forensic is Overwriting the metadata, as this conceals all the previous activities that have been done by the attacker to hide the anti forensic.

User Kenneth Ito
by
3.7k points