A security analyst needs to identify services in a small, critical infrastructure ICS network. Many components in the network are likely to break if they receive malformed or unusually large requests. Which of the following is the safest method to use when identifying service versions?
noa808a
2 weeks, 6 days agof90ecff
3 weeks agoJolly_7
3 weeks, 2 days ago[Removed]
2 months, 1 week agoexitbob
2 months, 3 weeks ago