+1 (218) 451-4151
glass
pen
clip
papers
heaphones

CYBERLAWS & ETHICAL HACKING

CYBERLAWS & ETHICAL HACKING

You are evaluating port scanning countermeasures to help prevent an attacker from acquiring information about your network. The options you are considering are the deny-all approach, firewall testing, and security awareness.

Answer the following question(s):

1. Which countermeasure is likely to offer the most protection, and why?

2. Which countermeasure is likely to offer the least protection, and why?

Fully address the question(s) in this task; provide valid rationale for your choices.