Which ASA feature is used to keep track of suspected attackers who create connections to too
many hosts or ports?
A.
complex threat detection
B.
scanning threat detection
C.
basic threat detection
D.
advanced threat detection
Which ASA feature is used to keep track of suspected attackers who create connections to too
many hosts or ports?
Which ASA feature is used to keep track of suspected attackers who create connections to too
many hosts or ports?
A.
complex threat detection
B.
scanning threat detection
C.
basic threat detection
D.
advanced threat detection