During which of the following attack phases might a request sent to port 1433 over a whole company network be seen within a log?
Reconnaissance
Scanning
Gaining access
Persistence
Submit