Question

NetFlow is used as a network security tool because _____________________________________________. A. it is better than IPSEC...

NetFlow is used as a network security tool because _____________________________________________.

A.

it is better than IPSEC

B.

it is better than SNMP

C.

it is better than IPFIX

D.

its reporting capabilities provide nonrepudiation, anomaly detection, and investigative capabilities

Homework Answers

Answer #1

Answer Option D

Reason: Option A is incorrect because it may be sometimes better than IPsec but it is not chosen over this for network security

Option B is incorrect because although NetFlow is more compact than SNMP but still it is not chosen over it for this reason

Option C is incorrect because IPFix is used for collecting data and is not chosen over it for network security

Option D is correct because NetFlow uses standard length fields and provide anomaly detection. Therefore it provides a better security than anyother and hence it is chosen.

If you liked the solution then give a thumbs up ? it will be really appreciated ?

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
This module focuses on the basics of Physical Security, Social Engineering, Network Vulnerabilities and Threats, Authentication,...
This module focuses on the basics of Physical Security, Social Engineering, Network Vulnerabilities and Threats, Authentication, Secure Protocols, Remote Access Security, and Troubleshooting Network Security Issues, Network Hardening, specifically, Detection and Prevention, Penetration Testing, Incident Response and Basic Forensics. Select one of these concepts, locate any online resource that helps you better understand the technology and how the technology is used in a production environment. You might consider the purpose, how the technology helps secure the network, or how the...
In which case an IPsec VPN is generally considered a better solution than an SSL VPN...
In which case an IPsec VPN is generally considered a better solution than an SSL VPN for remote access? Explain. A. Telecommuters coming from fixed sites, using managed corporate devices and terminating in a secure, private network on either side. B. Telecommuters without fixed access who want to come in from a variety of sites. C. Both of the above
A security has a beta of 1.20. Is this security more or less risky than the​...
A security has a beta of 1.20. Is this security more or less risky than the​ market? Explain. Assess the impact on the required return of this security in each of the following cases. 1). The market return increases by​ 15%. b. The market return decreases by​ 8%. c. The market return remains unchanged. A security has a beta of 1.20. Is this security more or less risky than the​ market?  ​(Select the best choice​ below.) A. The security and...
5.   A friend of yours asks you why market prices are better than government-determined prices. What...
5.   A friend of yours asks you why market prices are better than government-determined prices. What do you say? a. because they generally reflect the value of a good to society, but not the cost of making it b. because they generally reflect the cost to society of making a good, but not its value c. because they generally reflect both the value of a good to society and the cost of making it d. because they generally reflect neither...
The Internet: The Internet is vulnerable to system failure because it is a single, monolithic network....
The Internet: The Internet is vulnerable to system failure because it is a single, monolithic network. The Internet had its beginnings in the 1990’s when it was first used by the military and universities. The Internet flourished when its infrastructure was transitioned to be supported by government grants. The Internet is a network of networks – millions of them around the world. Which of the following statement is not true? Technical and legal complexity make pursuit and prosecution of hackers...
1. Weak acids make better buffers than strong acids because they have _____. A. conjugate bases...
1. Weak acids make better buffers than strong acids because they have _____. A. conjugate bases of reasonable strength B. weak conjugate bases C. low pH values 2. The pH of a buffered solution is determined by _____. A. the concentration of the weak acid B. the concentration of the conjugate base C. the acid ionization constant D. All of the above 3. pH = pKa if acid concentration is _____. A.higher than conjugate base concentration B. lower than conjugate...
.a. Explain the term Security Attacks b. An active attack is a network exploit in which...
.a. Explain the term Security Attacks b. An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. They are quite difficult to prevent active attacks absolutely because of the wide variety of potential physical, software, and network vulnerabilities. Briefly discuss three of such attacks. c. What is an antivirus? d.As a user, you may have come across systems with antivirus installed on them...
Because kangaroo rats are better able to concentrate urine than humans are, it would be expected...
Because kangaroo rats are better able to concentrate urine than humans are, it would be expected that, compared to the nephrons of human kidneys, the nephrons of kangaroo-rat kidneys would have: A. shorter collecting ducts. B. shorter loops of Henle. C. longer collecting ducts. D. longer loops of Henle The correct answer is D, but I am wondering why isn't it C since the functions of collecting ducts are reabsorbing water and further concentrating urine. Please explain to help with...
Cumulative abnormal returns (CAR) Select one: a. are used in event studies. b. are better measures...
Cumulative abnormal returns (CAR) Select one: a. are used in event studies. b. are better measures of security returns due to economic-wide events than are abnormal returns (AR). c. are cumulated over the period prior to the firm-specific event. d. are used in event studies and are better measures of security returns due to economic-wide events than are abnormal returns (AR). e. are used in event studies and are cumulated over the period prior to the economic-specific event. Fisher &...
Software that provides capabilities used by a particular industry , such as a ticketing system for...
Software that provides capabilities used by a particular industry , such as a ticketing system for airlines or banking system to process financial transactions, is known as a ____________________. A. vertical-market application B. thin-client application C. thick-client application D. horizontal-market application The 802.3 protocol for network communications is commonly called __________________ and is used for ______________local area network traffic. A. LTE; cellular B. Ethernet; wireless C. Ethernet; wired D. HTML; serviced-oriented