PdfPrep.com

Which suspicious pattern enables the cisco Tetration platform to learn the normal behavior of users?

Which suspicious pattern enables the cisco Tetration platform to learn the normal behavior of users?
A . file access from a different user
B . interesting file access
C . User login suspicious behavior
D . Privilege escalation

Answer: C

Exit mobile version