Which statement best describes how Cisco CTA identifies security breaches?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which statement best describes how Cisco CTA identifies security breaches?
A . Cisco CTA uses geo-location database signatures to geo-locate attackers, which provide forensic data points.
B . Breaches are identified by scanning SSL/TLS based payloads, decrypting the packet for deep packet analysis.
C . Cisco CTA leverages network traffic behaviors, machine learning, and anomaly detection to detect security breaches.
D . Cisco CTA performs detailed analytics based on provided SYSLOG and NetFlow v5 data elements.
E . Cisco CTA detects data breaches by decoding ESP security payloads and comparing them to known signatures from security intelligence feeds that are provided by the Talos Intelligence Group.

Answer: C

Leave a Reply

Your email address will not be published.