A. Potential precursor to an attack: Unauthorized network scans are often used by attackers to gather information about the network, such as identifying open ports, services, and vulnerabilities. This information can then be used to plan and execute an attack.
The detection of an unauthorized scan is indicative of A. Potential precursor to an attack, as such scans are typically part of the reconnaissance phase in the cyber kill chain, used by attackers to identify potential targets and vulnerabilities within the network.
Thanks for all your answers. Goodluck on your test
upvoted 5 times
...
...
This section is not available anymore. Please use the main Exam Page.CS0-003 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Chiniwini
Highly Voted 9 months, 2 weeks agoDrZoidBergsClaws
9 months ago