Ask Question
18 March, 06:09

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

+3
Answers (1)
  1. 18 March, 06:15
    0
    limit their scan speed

    Explanation:

    Based on the information provided within the question it can be said that the best course of action in this scenario would be to limit their scan speed. This will slow down the progress of the attack and at the same time allow you to verify where the attack is coming from and choose a course of action in order to stop the attack completely.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers