Which suspicious pa...
 
Notifications
Clear all

Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?

1 Posts
1 Users
0 Likes
81 Views
 Theo
(@baintheo)
Posts: 705
Noble Member
Topic starter
 

Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?

  • A . file access from a different user
    B. interesting file access
    C. user login suspicious behavior
    D. privilege escalation

Show Answer Hide Answer

Suggested Answer: C

Explanation:

The various suspicious patterns for which the Cisco Tetration platform looks in the current release are:

+ Shell code execution: Looks for the patterns used by shell code.

+ Privilege escalation: Watches for privilege changes from a lower privilege to a higher privilege in the process lineage tree.

+ Side channel attacks: Cisco Tetration platform watches for cache-timing attacks and page table fault bursts.

Using these, it can detect Meltdown, Spectre, and other cache-timing attacks.

+ Raw socket creation: Creation of a raw socket by a nonstandard process (for example, ping).

+ User login suspicious behavior: Cisco Tetration platform watches user login failures and user login

methods.

+ Interesting file access: Cisco Tetration platform can be armed to look at sensitive files.

+ File access from a different user: Cisco Tetration platform learns the normal behavior of which file is

accessed by which user.

+ Unseen command: Cisco Tetration platform learns the behavior and set of commands as well as the lineage of each command over time. Any new command or command with a different lineage triggers the interest of the Tetration Analytics platform.

Reference: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration-analytics/whitepaper-c11-740380.html
 
Posted : 07/01/2023 9:04 pm
Topic Tags

Latest 350-701 V2 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: