PdfPrep.com

Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports?

Which threat-detection feature is used to keep track of suspected attackers who create connections to too many hosts or ports?
A . complex threat detection
B . scanning threat detection
C . basic threat detection
D . advanced threat detection

Answer: B

Exit mobile version