Which threat-detection feature is used to keep track of suspected attackers who create
connections to too many hosts or ports?

A.
complex threat detection
B.
scanning threat detection
C.
basic threat detection
D.
advanced threat detection
You must be logged in to post a comment.
Correct !
0
0