phanuel99111 phanuel99111 30-11-2022 Computers and Technology contestada a malicious person is performing a technique called anti-forensics on a target network to hide evidence of an intrusion and conceal implanted rootkits and other malware. what is one action that might be taken when this method is used?