Q: 20
DRAG DROP [Security Concepts] Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right.
Drag & Drop
Discussion
Not quite right, I think the correct mapping is file access from a different user → learns normal behavior, interesting file access → sensitive files, user login suspicious behavior → access failures/methods, privilege escalation → process lineage movement. Trap is mixing up the first two!
privilege escalation → Tetration platform learns the normal behavior of users
user login suspicious behavior → Tetration platform is armed to look at sensitive files
interesting file access → Tetration platform watches user access failures and methods
file access from a different user → Tetration platform watches for movement in the process lineage tree
Really clear drag and drop format, similar to some practice sets I've tried.
user login suspicious behavior → Tetration platform is armed to look at sensitive files
interesting file access → Tetration platform watches user access failures and methods
file access from a different user → Tetration platform watches for movement in the process lineage tree
Really clear drag and drop format, similar to some practice sets I've tried.
Be respectful. No spam.
