Respuesta :

Attackers will initially attempt to find an IP address within the network that can be used to stage an attack. Hope this helps!