To make their activities more difficult to detect during a stealth attack, the appropriate technique would be to limit their scan speeds. Slower scan speeds help avoid detection by intrusion detection systems (IDS) and logs by spreading the scan over a longer period of time, making it less noticeable. Faster scan speeds are more likely to trigger alerts and become detectable.
If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appropriate to make their activities more difficult to detect?
Group of answer choices
increase their scan speeds
limit their tool set
increase their scan speeds
limit their scan speeds
1 answer