Watch this video on YouTube
At which of the following stages of the cyber kill chain is an organization likely to detect port scanning?