Question: 31 A network engineer viewing logs on an intrusion detection system sees that internal users have been running NMAP on their computer. What are the

31 A network engineer viewing logs on an intrusion detection system sees that internal users have been running NMAP on their computer. What are the users doing? aPing flood . Buffer overflow Port scan Smurf attack
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
