Which statement best describes how Cisco CTA identifies security breaches?

Which statement best describes how Cisco CTA identifies security breaches?
A. Cisco CTA uses geo-location database signatures to geo-locate attackers, which provide forensic data points.
B. Breaches are identified by scanning SSL/TLS based payloads, decrypting the packet for deep packet analysis.
C. Cisco CTA leverages network traffic behaviors, machine learning, and anomaly detection to detect security breaches.
D. Cisco CTA performs detailed analytics based on provided SYSLOG and NetFlow v5 data elements.
E. Cisco CTA detects data breaches by decoding ESP security payloads and comparing them to known signatures from security intelligence feeds that are provided by the Talos Intelligence Group.

cisco-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.