PdfPrep.com

Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?

Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
A . interesting file access
B . privilege escalation
C . file access from a different user
D . user login suspicious behavior

Answer: D

Exit mobile version