DRAG DROP (Drag and Drop is not supported)Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right.
Answer(s): A
Cisco Tetration platform studies the behavior of the various processes and applications in the workload,measuring them against known bad behavior sequences. It also factors in the process hashes it collects. By studying various sets of malwares, the Tetration Analytics engineering team deconstructed it back into its basic building blocks. Therefore, the platform understands clear and crisp definitions of these building blocks and watches for them.The various suspicious patterns for which the Cisco Tetration platform looks in the current release are:+ Shell code execution: Looks for the patterns used by shell code. + Privilege escalation: Watches for privilege changes from a lower privilege to a higher privilege in the process lineage tree.+ Side channel attacks: Cisco Tetration platform watches for cache-timing attacks and page table fault bursts.Using these, it can detect Meltdown, Spectre, and other cache-timing attacks. + Raw socket creation: Creation of a raw socket by a nonstandard process (for example, ping). + User login suspicious behavior: Cisco Tetration platform watches user login failures and user login methods.+ Interesting file access: Cisco Tetration platform can be armed to look at sensitive files. + File access from a different user: Cisco Tetration platform learns the normal behavior of which file is accessed by which user.+ Unseen command: Cisco Tetration platform learns the behavior and set of commands as well as the lineage of each command over time. Any new command or command with a different lineage triggers the interest of theTetration Analytics platform.
https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration- analytics/whitepaper-c11-740380.html
DRAG DROP (Drag and Drop is not supported)Drag and drop the descriptions from the left onto the encryption algorithms on the right.
Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetric encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.Asymmetric encryption takes relatively more time than the symmetric encryption. Diffie Hellman algorithm is an asymmetric algorithm used to establish a shared secret for a symmetric key algorithm. Nowadays most of the people uses hybrid crypto system i.e, combination of symmetric and asymmetric encryption. Asymmetric Encryption is used as a technique in key exchange mechanism to share secret key and after the key is shared between sender and receiver, the communication will take place using symmetric encryption. The shared secret key will be used to encrypt the communication.Triple DES (3DES), a symmetric-key algorithm for the encryption of electronic data, is the successor of DES (Data Encryption Standard) and provides more secure encryption then DES. Note: Although "requires secret keys" option in this question is a bit unclear but it can only be assigned to Symmetric algorithm.
DRAG DROP (Drag and Drop is not supported)Drag and drop the threats from the left onto examples of that threat on the right
A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.When your credentials have been compromised, it means someone other than you may be in possession of your account information, such as your username and/or password.
DRAG DROP (Drag and Drop is not supported)Drag and drop the VPN functions from the left onto the description on the right.
Post your Comments and Discuss Cisco® 350-701 exam with other Community members:
David A commented on January 16, 2024 Good Colombia Anonymous upvote
Kim commented on May 25, 2023 I just purchased and downloaded my files. Everything looks good so far. UNITED STATES upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 350-701 content, but please register or login to continue.