Which three flow protocols can the Sealth Watch System use to monitor potential security threats? (Choose two)
A. OperFLow
B. Ntop
C. IPFIX
D. NetFtow
E. sFlow
F. Jflow
Which three flow protocols can the Sealth Watch System use to monitor potential security threats? (Choose two)
A. OperFLow
B. Ntop
C. IPFIX
D. NetFtow
E. sFlow
F. Jflow