A program that defends against a port scanner will attempt to:
A.
Sends back bogus data to the port scanner
B.
Log a violation and recommend use of security-auditing tools
C.
Limit access by the scanning system to publicly available ports only
D.
Update a firewall rule in real time to prevent the port scan from being completed
D