Watch this video on YouTube
Which of the following practices helps security professionals defend a network or service against port scanning attempts?