Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Cisco 300-220 Dumps

Page: 1 / 6
Total 60 questions

Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Questions and Answers

Question 1

A SOC analyst is usingCisco Secure Network Analytics (Stealthwatch)to hunt for command-and-control (C2) activity across the enterprise. The analyst wants to identify stealthy C2 channels that intentionally avoid known malicious IP addresses and domains. Which Stealthwatch hunting approach BEST supports this objective?

Options:

A.

Blocking outbound traffic to known C2 IP addresses

B.

Monitoring NetFlow records for abnormal beaconing patterns

C.

Reviewing firewall deny logs for suspicious connections

D.

Relying on threat intelligence feeds for C2 indicators

Question 2

A threat hunter is performing a structured hunt usingCisco Secure Endpoint (AMP)telemetry to identify credential harvesting activity. Which data source is MOST critical during thedata collection and processing phaseof the hunt?

Options:

A.

File reputation scores from Talos

B.

Endpoint process execution and memory access events

C.

Threat intelligence reports from external vendors

D.

User-reported suspicious activity

Question 3

A structured threat hunt using Cisco Secure Network Analytics confirms abnormal internal SMB traffic consistent with lateral movement. Which action should occur NEXT to improve organizational security posture?

Options:

A.

Isolate the affected hosts immediately

B.

Reset all user credentials involved

C.

Document findings and create permanent detections

D.

Continue monitoring until more evidence is collected

Question 4

A security operations team is transitioning from alert-driven investigations to a mature threat hunting program. The team wants to focus on detecting adversaries who intentionally evade signature-based tools and traditional SIEM alerts by using legitimate credentials and native system utilities. Which hunting focus best supports this objective?

Options:

A.

Tracking known malicious IP addresses and domains from threat intelligence feeds

B.

Monitoring endpoint antivirus alerts for malware detections

C.

Analyzing abnormal behavior patterns across identity, endpoint, and network telemetry

D.

Blocking files with known malicious hashes at the firewall

Question 5

After completing a threat hunt that uncovered previously undetected credential abuse, the SOC wants to ensure long-term improvement in detection and response capabilities. Which action BEST represents the final and most critical phase of the threat hunting lifecycle?

Options:

A.

Immediately blocking all related IP addresses

B.

Documenting findings and updating detection logic

C.

Resetting affected user credentials

D.

Conducting additional unstructured hunts

Question 6

A security analyst receives an alert that host A, which has an IP address of 192.168.5.39, has a new browser extension installed. During an investigation of the SIEM tool logs, the analyst discovers that host A made continuous TCP connections to an IP address of 1.25.241.8 via TCP port 80. The 1.25.241.8 IP address is categorized as a C2 server. Which action should the analyst take to mitigate similar connections in the future?

Options:

A.

Configure a browser extension deny list.

B.

Use antivirus software to quarantine suspicious files automatically.

C.

Use Deep Packet Inspection to block malicious domains.

D.

Use IDS to detect and avoid similar connections.

Question 7

Refer to the exhibit.

as

An analyst is evaluating artifacts and logs collected from recent breach. In the logs, ATP established persistency of malware by placing a path to the executable in a specific registry entry. What is the difference between the ATP's approach and using HKEY LOCAL MACHINE\Software\Microsoft\Windows\CurrentVersion\Run instead?

Options:

A.

The key is available only on older versions of Windows and is not supported in newer ones.

B.

Entries in this key are automatically removed after a system restart, which prevents persistence.

C.

Modifying this key requires administrative privileges, which the malware might not have.

D.

This key is meant for system settings and not for storing startup program entries.

Question 8

Refer to the exhibit.

as

A company went through several rounds of restructuring and the previous security team has been let go A new engineer joins and rediscovers all the tools thatthe previous team left behind.One of the tools Is a Bash script related to monitoring AWS accounts for threats What is the purpose of the script?

Options:

A.

monitoring failed AWS console login attempts

B.

automating connection to AWS accounts

C.

monitoring for AWS instance errors

D.

archiving records from the ConsoleLogin source

Question 9

A threat hunting team wants to ensure hunts are repeatable, scalable, and less dependent on individual analyst intuition. What is the MOST important process improvement?

Options:

A.

Increasing the number of threat intelligence feeds

B.

Automating alert triage workflows

C.

Standardizing hunt documentation and hypotheses

D.

Blocking all suspicious activity automatically

Question 10

A SOC team wants to detect lateral movement performed using legitimate administrative tools rather than malware. Which telemetry source provides the MOST reliable visibility for this hunting objective?

Options:

A.

Antivirus detection logs

B.

Email security gateway logs

C.

Authentication and remote execution logs

D.

Web proxy URL filtering logs

Question 11

Refer to the exhibit.

as

A threat-hunting team makes an EDR query to detect possible C2 outbound communication across all endpoints. Which level of the Pyramid of Pain is being used?

Options:

A.

Tough

B.

Challenging

C.

Easy

D.

Simple

Question 12

According to the MITRE ATT&CK framework, how is the password spraying technique classified?

Options:

A.

Privilege escalation

B.

Initial access

C.

Lateral movement

D.

Credential access

Question 13

Refer to the exhibit.

as

A forensic team must investigate how the company website was defaced. The team isolates the web server, clones the disk, and analyzes the logs. Which technique was used by the attacker initially to access the website?

Options:

A.

exploit public-facing application

B.

external remote services

C.

command and scripting interpreter

D.

drive-by compromise

Question 14

While investigating multiple incidents, analysts notice that attackers consistently use SMB for lateral movement and avoid PowerShell execution. Why is this observation valuable for attribution?

Options:

A.

It identifies the exploit used for initial access

B.

It reveals the attacker’s malware development framework

C.

It highlights consistent attacker tradecraft

D.

It confirms data exfiltration techniques

Question 15

The CISO must improve the threat-hunting strategy to strengthen the organization's security posture and better prepare against sophisticated threats. Which aspect of the Threat Hunting Maturity Model can significantly enhance an organization's ability to address challenges outlined in the Pyramid of Pain?

Options:

A.

Emphasizing focus on compliance-driven security checks and audits to ensure seamless audit

B.

Conducting threat assessments and wargames quarterly during scheduled security reviews

C.

Transitioning from reactive to proactive threat hunting to identify unknown threats and vulnerabilities

D.

Developing automated processes to systematically detect known threats across the network

Question 16

During multiple intrusions, analysts observe that attackers consistently perform internal reconnaissance before privilege escalation, avoid noisy exploitation, and limit actions to business hours of the victim’s region. Why is this observation important for attribution?

Options:

A.

It confirms the use of a specific exploit kit

B.

It indicates an advanced persistence mechanism

C.

It reveals operational discipline and intent

D.

It identifies the malware command-and-control protocol

Question 17

What triggers unstructured threat hunting?

Options:

A.

Indicators of compromise

B.

Tactics, techniques, and procedures

C.

Customized threat identification

D.

Indicators of attack

Question 18

A threat hunter is usingCisco Secure Network Analytics (Stealthwatch)to investigate possible lateral movement inside the network. Which behavior would MOST strongly indicate lateral movement using valid credentials?

Options:

A.

High volume of inbound internet traffic to a web server

B.

Internal systems authenticating to multiple hosts using SMB in a short time

C.

DNS queries to newly registered domains

D.

Repeated HTTP requests to the same external IP address

Page: 1 / 6
Total 60 questions