Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports?
A . complex threat detection
B . scanning threat detection
C . basic threat detection
D . advanced threat detection
Answer: B