I ama bit confused, The question is asking what are the two engines, and not which threats is this capable to detect. I did not find any relevant information about engines though.
AB:Cognitive Threat Analytics (CTA) is a security solution provided by Cisco that uses machine learning to detect and analyze advanced security threats. CTA uses several detection and analytics engines to identify security threats, including data exfiltration and command and control communication.REFERENCE:https://www.cisco.com/c/en/us/products/security/cognitive-threat-analytics/index.html
This must be a very old question.
https://community.cisco.com/t5/security-knowledge-base/cognitive-intelligence-formerly-cognitive-threat-analytics-or/ta-p/3651030#:~:text=Formerly%20known%20as%20Cognitive%20Threat,for%20Endpoints%2C%20and%20Threat%20Grid.
And this was published on Oct 26th 2017: "Formerly known as Cognitive Threat Analytics (CTA), Cognitive Intelligence has evolved from a point product to an embedded feature of several Cisco Security products, including Stealthwatch, AMP for Endpoints, and Threat Grid."
And this was published on Feb 1st 2021: "Cognitive Intelligence changing its name to global threat alerts"
https://community.cisco.com/t5/security-blogs/cognitive-release-note-january-2021-cognitive-intelligence/ba-p/4283808
Data exfiltration:- Cognitive Threat Analytics uses statistical modeling of an
organization’s network to identify anomalous web traffic
and pinpoint the exfiltration of sensitive data. It recognizes
data exfiltration even in HTTPS-encoded traffic, without any
need for you to decrypt transferred content.
Command-and-control
(C2) communication:-
Cognitive Threat Analytics combines a wide range of data,
ranging from statistics collected on an Internet-wide level
to host-specific local anomaly scores. Combining these
indicators inside the statistical detection algorithms allows
us to distinguish C2 communication from benign traffic and
from other malicious activities. Cognitive Threat Analytics
recognizes C2 even in HTTPS-encoded or anonymous
traffic, including Tor, without any need to decryp
So the correct answer is AB
upvoted 3 times
...
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Oz3006
Highly Voted 4 years, 6 months agoPremium_Pils
Most Recent 8 months, 1 week agosull3y
2 years agodavezz
2 years, 2 months agosis_net_sec
2 years, 9 months ago