Juniper Exam Questions

Which rule base would detect the use of nmap on a network?

Which rule base would detect the use of nmap on a network?

A.
SYN protector

B.
traffic anomalies

C.
backdoor

D.
exempt