Which technique would a threat actor use to disguise traces of an ongoing exploit?
Which technique would a threat actor use to disguise traces of an ongoing exploit? Explanation: The Network Time Protocol (NTP) uses a hierarchy of time sources to provide a consistent…