Which rule base would detect the use of nmap on a network?
A.
SYN protector
B.
traffic anomalies
C.
backdoor
D.
exempt
Which rule base would detect the use of nmap on a network?
Which rule base would detect the use of nmap on a network?
A.
SYN protector
B.
traffic anomalies
C.
backdoor
D.
exempt