header bg

Scan QR code or get instant email to install app

Question:

Which protocol, if present, would be the best evidence supporting Brandy's theory in the case that she is conducting a vulnerability scan of an enterprise network and believes that there are Windows file shares in use on the network?

A SMB
explanation

Comments

Leave a Reply

Your email address will not be published.

*