If an attacker were able to gain access to a user's machine on your network, which of the following actions would she most likely take next?
Start log scrubbing
Escalate privileges
Perform port scanning
Initiate reconnaissance
Submit