Ask Question
2 March, 17:31

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

+3
Answers (1)
  1. 2 March, 20:20
    0
    limit their scan speed

    Explanation:

    Based on the information provided within the question it can be said that the best course of action in this scenario would be to limit their scan speed. This will slow down the progress of the attack and at the same time allow you to verify where the attack is coming from and choose a course of action in order to stop the attack completely.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers