Scenario 1: An internal host generates a high volume of SYN packets to a range of ports on various servers within the network. Investigation reveals that the host is compromised, and the attacker is mapping the network to identify exploitable services.
Scenario 2: A security team runs a scheduled vulnerability assessment, triggering the detection of a suspicious port sweep. The activity is verified as benign after confirming with the IT department.