It should be Ethos
Spero: A machine-learning based technology that proactively identifies threats that were previously unknown.
Uses active heuristics to gather execution attributes
Needs good data in large sets to tune
Built to identify new malware
Ethos: A generic signature capability, again ostensibly similar to the
generic detection capabilities
that some vendors provide.
Directed at families of malware
Can have more false-positives than 1-to-1 signatures
agreed - Ethos is a generic signature capability that provides a way to help with the reality that one-to-one signatures are easily evaded. With Ethos, you can detect families of malware.
"detect different families of malware" = ETHOS
See line diagram at page 109 in this PDF (page 120 according to page numbers) - it depicts sequence of AMP operations and their functions:
https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/R6BGArNQ/TECSEC-2599.pdf
Answer is D
ETHOS is the Cisco file grouping engine. It allows us to group families of files together
so if we see variants of a malware, we mark the ETHOS hash as malicious and whole
families of malware are instantly detected.
ETHOS and SPERO are both considered generic engines. Because of this, the user has
the ability to control how false positive-prone an ETHOS or SPERO hash is.
ETHOS is the Cisco file grouping engine. It allows us to group families of files together
so if we see variants of a malware, we mark the ETHOS hash as malicious and whole
families of malware are instantly detected
SPERO is the Cisco machine-based learning system. We use hundreds of features of
a file, which we call a SPERO fingerprint. This is sent to the cloud and SPERO trees
determine whether a file is malicious.
"ETHOS is the Cisco file grouping engine. It allows us to group families of files together so if we see variants of a malware, we mark the ETHOS hash as malicious and whole families of malware are instantly detected."
Source: https://docs.amp.cisco.com/en/SecureEndpoint/Secure%20Endpoint%20User%20Guide.pdf
C is correct.
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Reference_a_wrapper_Chapter_topic_here.html#ID-2199-000005d8
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Ampersand
Highly Voted 1 year, 11 months agowfexco
1 year, 11 months agoNikoNiko
Most Recent 9 months, 2 weeks agoSparrsh
1 year agoiceman24ccs
1 year, 3 months agoidto
1 year, 4 months agojaciro11
1 year, 5 months agojaciro11
1 year, 5 months agoMoII
1 year, 5 months agoStardec
1 year, 5 months ago