You have hired a cybersecurity company to conduct a routine penetration test. While reviewing logs on a server you notice a public IP probing a large number of different ports with a single SYN packet each. What tactic is most likely being used by the cybersecurity company?

  • DDoS
  • Port scanning
  • SYN flood
  • DOS

CompTIA Security+ SY0-601
  • Attacks, Threats, and Vulnerabilities
  • Architecture and Design
  • Implementation
  • Operations and Incident Response
    • This question is filed here
  • Governance, Risk, and Compliance