Some of the drawbacks to the effectiveness of NSM include all of the following, except which one?
a. Encrypted network traffic, such as through a VPN
b. Differences in operating systems between the NSM server and other servers
c. Complex networks with widespread use of NAT technologies
d. Extremely high network traffic with insufficient NSM resources
e. Highly mobile computing environment using unmonitored WiFi or WLAN