If an attacker were able to gain access to a user’s machine on your network, which of the following actions would she most likely take next?

If an attacker were able to gain access to a user’s machine on your network, which of the following actions would she most likely take next?
A . Start log scrubbing
B. Escalate privileges
C. Perform port scanning
D. Initiate reconnaissance

Answer: C

Latest ITS-110 Dumps Valid Version with 100 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments