What tools are available to be able to correlate security monitoring events in environments where NAT is deployed?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Network address translation (NAT) introduces challenges in the identification and attribution of endpoints in a security victim. The identification challenge applies to both the victim and the attack source.

What tools are available to be able to correlate security monitoring events in environments where NAT is deployed?
A . NetFlow
B . Cisco Lancope Stealthwatch System
C . Intrusion Prevention Systems (IPS)
D . Encryption protocols

Answer: B

Leave a Reply

Your email address will not be published.