A SOC analyst is analyzing traffic on a network and notices an unauthorized scan. Which of the following types of activities is being observed?
Potential precursor to an attack
Unauthorized peer-to-peer communication
Rogue device on the network
System updates
Submit