Ask Question
26 June, 18:33

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

+5
Answers (1)
  1. 26 June, 20:28
    0
    limit their scan speed

    Explanation:

    Based on the information provided within the question it can be said that the best course of action in this scenario would be to limit their scan speed. This will slow down the progress of the attack and at the same time allow you to verify where the attack is coming from and choose a course of action in order to stop the attack completely.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers