Some of the drawbacks to the effectiveness of NSM include all of the following, except which one?
a. Encrypted network traffic, such as through a VPN
b. Differences in operating systems between the NSM server and other servers
c. Complex networks with widespread use of NAT technologies
d. Extremely high network traffic with insufficient NSM resources
e. Highly mobile computing environment using unmonitored WiFi or WLAN

Respuesta :

Answer:

The answer is B: Differences in operating systems between the NSM server and other servers

Explanation:

All the evils on your network can be conquered effectively with the proper use NSM. NSM data equips CIRTs to detect and respond to cyber- attacks. With NSM, security analysts are able to discover intrusions early on in the process. Having highlighted all these positives, NSM encounters difficulties when faced with all of the above options apart from B.