It is but it may cut down on the number of scans. Most of the scans are automated and are looking for well known ports. A determined attacker (human) is going to run a full port scan to determine what is open and target that.Does that really work? I always thought this was security by obscurity (which doesn't work)...