header bg

Question:

Which protocol, if present, would be the best evidence supporting Brandy's theory in the case that she is conducting a vulnerability scan of an enterprise network and believes that there are Windows file shares in use on the network?

A SMB
Explaination