⚡️Lightning Sale: 50% off Lifetime Membership!⚡️

You have hired a cybersecurity company to conduct a routine penetration test. While reviewing logs on a server you notice a public IP probing a large number of different ports with a single SYN packet each. What tactic is most likely being used by the cybersecurity company?

  • Port scanning
  • SYN flood
  • DOS
  • DDoS

Your Score:
Attacks, Threats, and Vulnerabilities
Architecture and Design
Implementation
Operations and Incident Response
Governance, Risk, and Compliance
CompTIA Security+ SY0-601
  • Attacks, Threats, and Vulnerabilities
  • Architecture and Design
  • Implementation
  • Operations and Incident Response
    • This question is filed here
  • Governance, Risk, and Compliance