If an attacker were able to gain access to a user’s machine on your network, which of the following actions would she most likely take next?
A . Start log scrubbing
B. Escalate privileges
C. Perform port scanning
D. Initiate reconnaissance
Answer: C
Latest ITS-110 Dumps Valid Version with 100 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund