Question

NetFlow is used as a network security tool because _____________________________________________. A. it is better than IPSEC...

NetFlow is used as a network security tool because _____________________________________________.

A.

it is better than IPSEC

B.

it is better than SNMP

C.

it is better than IPFIX

D.

its reporting capabilities provide nonrepudiation, anomaly detection, and investigative capabilities

Homework Answers

Answer #1

Answer Option D

Reason: Option A is incorrect because it may be sometimes better than IPsec but it is not chosen over this for network security

Option B is incorrect because although NetFlow is more compact than SNMP but still it is not chosen over it for this reason

Option C is incorrect because IPFix is used for collecting data and is not chosen over it for network security

Option D is correct because NetFlow uses standard length fields and provide anomaly detection. Therefore it provides a better security than anyother and hence it is chosen.

If you liked the solution then give a thumbs up ? it will be really appreciated ?

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
This module focuses on the basics of Physical Security, Social Engineering, Network Vulnerabilities and Threats, Authentication,...
This module focuses on the basics of Physical Security, Social Engineering, Network Vulnerabilities and Threats, Authentication, Secure Protocols, Remote Access Security, and Troubleshooting Network Security Issues, Network Hardening, specifically, Detection and Prevention, Penetration Testing, Incident Response and Basic Forensics. Select one of these concepts, locate any online resource that helps you better understand the technology and how the technology is used in a production environment. You might consider the purpose, how the technology helps secure the network, or how the...
A security has a beta of 1.20. Is this security more or less risky than the​...
A security has a beta of 1.20. Is this security more or less risky than the​ market? Explain. Assess the impact on the required return of this security in each of the following cases. 1). The market return increases by​ 15%. b. The market return decreases by​ 8%. c. The market return remains unchanged. A security has a beta of 1.20. Is this security more or less risky than the​ market?  ​(Select the best choice​ below.) A. The security and...
5.   A friend of yours asks you why market prices are better than government-determined prices. What...
5.   A friend of yours asks you why market prices are better than government-determined prices. What do you say? a. because they generally reflect the value of a good to society, but not the cost of making it b. because they generally reflect the cost to society of making a good, but not its value c. because they generally reflect both the value of a good to society and the cost of making it d. because they generally reflect neither...
The Internet: The Internet is vulnerable to system failure because it is a single, monolithic network....
The Internet: The Internet is vulnerable to system failure because it is a single, monolithic network. The Internet had its beginnings in the 1990’s when it was first used by the military and universities. The Internet flourished when its infrastructure was transitioned to be supported by government grants. The Internet is a network of networks – millions of them around the world. Which of the following statement is not true? Technical and legal complexity make pursuit and prosecution of hackers...
.a. Explain the term Security Attacks b. An active attack is a network exploit in which...
.a. Explain the term Security Attacks b. An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en route to the target. They are quite difficult to prevent active attacks absolutely because of the wide variety of potential physical, software, and network vulnerabilities. Briefly discuss three of such attacks. c. What is an antivirus? d.As a user, you may have come across systems with antivirus installed on them...
Because kangaroo rats are better able to concentrate urine than humans are, it would be expected...
Because kangaroo rats are better able to concentrate urine than humans are, it would be expected that, compared to the nephrons of human kidneys, the nephrons of kangaroo-rat kidneys would have: A. shorter collecting ducts. B. shorter loops of Henle. C. longer collecting ducts. D. longer loops of Henle The correct answer is D, but I am wondering why isn't it C since the functions of collecting ducts are reabsorbing water and further concentrating urine. Please explain to help with...
Cumulative abnormal returns (CAR) Select one: a. are used in event studies. b. are better measures...
Cumulative abnormal returns (CAR) Select one: a. are used in event studies. b. are better measures of security returns due to economic-wide events than are abnormal returns (AR). c. are cumulated over the period prior to the firm-specific event. d. are used in event studies and are better measures of security returns due to economic-wide events than are abnormal returns (AR). e. are used in event studies and are cumulated over the period prior to the economic-specific event. Fisher &...
The most used tool of the Fed is: a. the discount window. b. the reserve requirement....
The most used tool of the Fed is: a. the discount window. b. the reserve requirement. c. open market operations. d. These are all used with equal frequency.
Social engineering is used to: A. manipulate an employee into divulging network access information and/or a...
Social engineering is used to: A. manipulate an employee into divulging network access information and/or a password. B. perform a zero-day network intrusion. C. find out which changes were made to files and by whom. D. create usable and friendly software programs.
Economic income is considered to be a better predictor of future cash flows than accounting income...
Economic income is considered to be a better predictor of future cash flows than accounting income is. A technique used by security analysts to determine the degree of correlation between a firm’s accounting earnings and its true economic income is quality of earnings assessment. Required: Obtain an annual report for a large corporation and perform a quality of earnings assessment?
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT