DRAG DROP - Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right. Select and Place:
Privilege escalation: Watches for privilege changes from a lower privilege to a higher privilege in the process lineage tree.
User login suspicious behavior: Cisco Secure Workload platform watches user login failures and user login methods.
Interesting file access: Cisco Secure Workload platform can be armed to look at sensitive files.
File access from a different user: Cisco Secure Workload platform learns the normal behavior of which file is accessed by which user.
https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration-analytics/white-paper-c11-740380.html
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Kyle1776
Highly Voted 2 years, 8 months agoMPoels
8 months, 2 weeks ago