Refer to the exhibit. An attacker gained initial access to the company’s network and ran an Nmap scan to advance with the lateral movement technique and to search the sensitive data. Which two elements can an attacker identify from the scan? (Choose two.)
Ben789456
10 months, 1 week agolistas
11 months, 3 weeks agosheyshey
1 year agoaole
1 year ago