10 Interview questions on Cisco Secure Workload (Tetration)

Today we are going to talk about the basic few questions which are usually asked in the interview for Cisco Tetration (Cisco Secure Workload platform). 

Let's start with the first part of interview questions in Cisco Secure Workload (Tetration). we will come up with another round of questions in Cisco Secure Workload (Tetration)

Fig 1.1- Cisco Secure Workload (Tetration)

Q1: What is Cisco Tetration and what it is called now?
Cisco Tetration is a one of the secured hybrid-cloud workload platform and is generally used to secure compute instances in both the on-premises data center and the public cloud.

Now Tetration is called with the name “ Cisco Secure Workload platform

Q2: What are the benefits of Cisco Secure Workload platform?
Below are the some of the benefits of the Cisco Secure Workload Platform

  • Visibility into application components
  • Automatically generate micro segmentation policy based on application behavior
  • Enforce this micro segmentation policy across all multicloud workloads
  • Identify software vulnerabilities and exposures to reduce attack surface
  • Provide process behavior baselining and identify deviations

Q3: What are ERSPAN sensors in Cisco Secure Workload platform?
Hope you guys heard about the ERSPAN. Well here ERSPAN sensors are out-of-band sensors are designed to generate Cisco Secure Workload telemetry data using copies of network packet headers delivered from the network infrastructure through Encapsulated Remote SPAN (ERSPAN) configuration.

Q4:How secure is Cisco Secure Workload platform?
Now a days security first step is zero-trust model and Cisco Secure Workload platform internally uses zero-trust, SELinux controls, certification-based authentication, and encryption to ensure that all communication to the cluster and within the cluster is secure.

Q5: How much network traffic does Cisco Secure Workload telemetry generate?
Dont worry about the telemetry stream collections. Cisco Secure Workload collects only metadata, not the packet itself; therefore, the bandwidth requirement is very low.

Q6: Where is the micro segmentation policy enforced?
Micro segmentation is one of the most demanding use cases in the campus and Datacenter environment. Policy is primarily enforced using the operating system firewall capabilities of the workload. Enforcement-enabled software sensors orchestrate the policy using IP sets in Linux-based servers and advanced firewall functions in Microsoft Windows servers.

Q7: How do users access information from the Cisco Secure Workload platform?
Cisco Secure Workload enables user access through an easy-to-navigate and scalable web UI with programmatic access through an extensive set of Representational State Transfer (REST) APIs.

Q8: What are Netflow connectors?
The Netflow connector is designed to generate Cisco Secure Workload telemetry data from Netflow v9 or IPFIX records.

Q9: What is an allow-list model?
The allow-list model provides more front-end protection: no waiting for malware to be identified before you can list the name and then avoid it. A zero-trust model requires an allow-list policy.

Q10: What is Secure Workload Flow Ingest Connectors ?
Deployed in a Secure Workload Ingest Virtual Appliance, Secure Workload supports a range of telemetry sources, including network data sources such as Netflow/IPFIX, Application Delivery Controllers (ADCs), firewalls ( Cisco ASA and FTD) and AWS, along with endpoint data sources such as Cisco AnyConnect and Cisco ISE.