During a penetration testing engagement, you are reviewing server log files and observe a high number of login attempts from foreign IP addresses, frequent access requests for unusual files, and command history that includes reconnaissance tools not used by any team member. These observations are critical to communicate because they could suggest what?
The system's firewall is automatically blocking potential threats effectively.
A scheduled backup of server files is in progress.
The intrusion detection system is functioning with high accuracy.
Team members are likely conducting stress tests on the server.
The system may have been previously compromised.
Routine maintenance is being performed by the IT department.