To create a stronger Connection with the target .
To create a ghost server on the network
To o btain a remote access connection
To hide malicious activity on the network
Source: সহকারী প্রোগ্রামার ০১. ০৩.২০১৯
Answer: To hide malicious activity on the network
Explanation:
Write Reply...