You have hired a cybersecurity company to conduct a routine penetration test. While reviewing logs on a server you notice a public IP probing a large number of different ports with a single SYN packet each. What tactic is most likely being used by the cybersecurity company?
|Attacks, Threats, and Vulnerabilities|
|Architecture and Design|
|Operations and Incident Response|
|Governance, Risk, and Compliance|