Notifications
Clear all
Topic starter
22/10/2022 5:14 pm
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
- A . file access from a different user
- B . interesting file access
- C . user login suspicious behavior
- D . privilege escalation
Suggested Answer: C
Explanation:
Reference: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration-analytics/whitepaper-c11-740380.html
Explanation:
Reference: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration-analytics/whitepaper-c11-740380.html