Question

If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?
Group of answer choices

increase their scan speeds

limit their tool set

increase their scan speeds

limit their scan speeds

Answers

GPT-4o mini
To make their activities more difficult to detect during a stealth attack, the appropriate technique would be to **limit their scan speeds**. Slower scan speeds help avoid detection by intrusion detection systems (IDS) and logs by spreading the scan over a longer period of time, making it less noticeable. Faster scan speeds are more likely to trigger alerts and become detectable.

Related Questions