Posted by: Pdfprep
Post Date: December 14, 2020
Which statement best describes how Cisco CTA identifies security breaches?
A . Cisco CTA uses geo-location database signatures to geo-locate attackers, which provide forensic data points.
B . Breaches are identified by scanning SSL/TLS based payloads, decrypting the packet for deep packet analysis.
C . Cisco CTA leverages network traffic behaviors, machine learning, and anomaly detection to detect security breaches.
D . Cisco CTA performs detailed analytics based on provided SYSLOG and NetFlow v5 data elements.
E . Cisco CTA detects data breaches by decoding ESP security payloads and comparing them to known signatures from security intelligence feeds that are provided by the Talos Intelligence Group.
Answer: C
Leave a Reply