Which element can be used by a threat actor to discover a possible opening into a target network and can also be used by an analyst to determine the protocol of the malicious traffic?
A . TTLs
B . ports
C . SMTP replies
D . IP addresses
Answer: B
Which element can be used by a threat actor to discover a possible opening into a target network and can also be used by an analyst to determine the protocol of the malicious traffic?
A . TTLs
B . ports
C . SMTP replies
D . IP addresses
Answer: B