Posted by: Pdfprep
Post Date: November 9, 2020
Network address translation (NAT) introduces challenges in the identification and attribution of endpoints in a security victim. The identification challenge applies to both the victim and the attack source.
What tools are available to be able to correlate security monitoring events in environments where NAT is deployed?
A . NetFlow
B . Cisco Lancope Stealthwatch System
C . Intrusion Prevention Systems (IPS)
D . Encryption protocols
Answer: B
Leave a Reply