A cybersecurity analyst has received the laptop of a user who recently left the company. The analyst types
‘history’ into the prompt, and sees this line of code in the latest bash history:
This concerns the analyst because this subnet should not be known to users within the company. Which of the following describes what this code has done on the network?
Performed a ping sweep of the Class C network.
Performed a half open SYB scan on the network.
Sent 255 ping packets to each host on the network.
Sequentially sent an ICMP echo reply to the Class C network.