If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?

Group of answer choices

increase their scan speeds

limit their tool set

increase their scan speeds

limit their scan speeds

1 answer

To make their activities more difficult to detect during a stealth attack, the appropriate technique would be to limit their scan speeds. Slower scan speeds help avoid detection by intrusion detection systems (IDS) and logs by spreading the scan over a longer period of time, making it less noticeable. Faster scan speeds are more likely to trigger alerts and become detectable.