Exam 350-401 All QuestionsBrowse all questions from this exam
Question 859

Which two security mechanisms are used by Cisco Threat Defense to gain visibility into the most dangerous cyber threats? (Choose two.)

    Correct Answer: B, D

    Cisco Threat Defense employs file reputation and traffic telemetry as key security mechanisms. File reputation involves assessing the credibility and behavior of files to detect potential threats. Traffic telemetry involves collecting and analyzing network traffic data to identify and respond to security incidents. These mechanisms provide comprehensive visibility and insights into cyber threats, enabling more effective threat detection and response.

Discussion
HorsefeathersOptions: BD

Question 770 answers this: Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats? D. threat defense

SeMo0o0oOptions: BD

B and D are correct

SeMo0o0oOptions: BD

B and D are correct

slacker_at_workOptions: BD

- File reputation: This mechanism involves analyzing the reputation of files based on their behavior, metadata, and other attributes to identify potentially malicious files. - Traffic Telemetry: This mechanism involves monitoring and analyzing network traffic in real-time to detect and respond to security threats and anomalies.