You have hired a cybersecurity company to conduct a routine penetration test. While reviewing logs on a server you notice a public IP probing a large number of different ports with a single SYN packet each. What tactic is most likely being used by the cybersecurity company?
DOS
SYN flood
Port scanning
DDoS
Operations and Incident Response | |
Architecture and Design | |
Implementation | |
Governance, Risk, and Compliance | |
Attacks, Threats, and Vulnerabilities |