Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cisco 300-220 Dumps Questions Answers

Page: 1 / 5
Total 60 questions

Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Questions and Answers

Question 1

What is a limitation of automated dynamic malware analysis tools?

Options:

A.

Vulnerabilities in runtime environments cannot be found.

B.

They produce false positives and false negatives.

C.

All programming languages are not supported.

D.

They are time consuming when performed manually.

Buy Now
Question 2

After completing a threat hunt that uncovered previously undetected credential abuse, the SOC wants to ensure long-term improvement in detection and response capabilities. Which action BEST represents the final and most critical phase of the threat hunting lifecycle?

Options:

A.

Immediately blocking all related IP addresses

B.

Documenting findings and updating detection logic

C.

Resetting affected user credentials

D.

Conducting additional unstructured hunts

Question 3

A threat hunter wants to detect credential dumping attempts that bypass traditional malware detection. Which telemetry source is MOST effective for this purpose?

Options:

A.

Email gateway attachment logs

B.

Endpoint memory access telemetry

C.

DNS query logs

D.

Firewall allow/deny logs

Question 4

The security team detects an alert regarding a potentially malicious file namedFinancial_Data_526280622.pdfdownloaded by a user. Upon reviewing SIEM logs and Cisco Secure Endpoint, the team confirms that the file was obtained from an untrusted website. The hash analysis of the file returns an unknown status. Which action must be done next?

Options:

A.

Submit the file for sandboxing.

B.

Review the directory path where the file is stored.

C.

Run a complete malware scan on the user's workstation.

D.

Investigate the reputation of the untrusted website.

Question 5

Refer to the exhibit. A penetration test performed against a web application generates the error message. Which two pieces of information are exposed? (Choose two.) Q Internal paths of the web server

Options:

A.

service and version of the web server

B.

Apache Jasper is vulnerable to path injection.

C.

technology used by the application

D.

version of the web browser

Question 6

A security operations team is transitioning from alert-driven investigations to a mature threat hunting program. The team wants to focus on detecting adversaries who intentionally evade signature-based tools and traditional SIEM alerts by using legitimate credentials and native system utilities. Which hunting focus best supports this objective?

Options:

A.

Tracking known malicious IP addresses and domains from threat intelligence feeds

B.

Monitoring endpoint antivirus alerts for malware detections

C.

Analyzing abnormal behavior patterns across identity, endpoint, and network telemetry

D.

Blocking files with known malicious hashes at the firewall

Question 7

Refer to the exhibit.

A company went through several rounds of restructuring and the previous security team has been let go A new engineer joins and rediscovers all the tools thatthe previous team left behind.One of the tools Is a Bash script related to monitoring AWS accounts for threats What is the purpose of the script?

Options:

A.

monitoring failed AWS console login attempts

B.

automating connection to AWS accounts

C.

monitoring for AWS instance errors

D.

archiving records from the ConsoleLogin source

Question 8

A threat hunter usesCisco Secure Network Analytics (Stealthwatch)to identify potential command-and-control traffic. Which characteristic MOST strongly indicates beaconing behavior?

Options:

A.

Large file transfers to external IP addresses

B.

Irregular outbound connections over multiple protocols

C.

Small, periodic outbound connections to a rare destination

D.

High-volume inbound traffic from the internet

Question 9

According to the MITRE ATT&CK framework, how is the password spraying technique classified?

Options:

A.

Privilege escalation

B.

Initial access

C.

Lateral movement

D.

Credential access

Question 10

A mature SOC notices that several incidents over the past year involved attackers abusing legitimate administrative tools rather than deploying custom malware. Leadership asks the threat hunting team to improve detection coverage in a way that increases attacker cost rather than relying on easily replaceable indicators. Which detection strategy best aligns with this objective?

Options:

A.

Blocking known malicious file hashes at the endpoint

B.

Correlating attacker behavior across multiple MITRE ATT&CK techniques

C.

Ingesting additional commercial threat intelligence feeds

D.

Creating alerts for newly registered domains

Question 11

Refer to the exhibit.

The cybersecurity team at a company detects an ongoing attack directed at the web server that hosts the company website. The team analyzes the logs of the web application firewall and discovers several HTTP requests encoded in Base64. The team decodes the payloads and retrieves the HTTP requests. What did the attackers use to exploit the server?

Options:

A.

Unicode encoding

B.

SQL injection

C.

directory traversal

D.

cross-site scripting (XSS)

Question 12

A SOC repeatedly discovers similar attacker behaviors during separate hunts, indicating recurring detection gaps. What process change MOST effectively prevents rediscovery of the same threats?

Options:

A.

Increasing analyst staffing

B.

Automating hunt execution

C.

Converting hunt findings into permanent detections

D.

Conducting more frequent unstructured hunts

Question 13

During multiple intrusions, analysts observe that attackers consistently perform internal reconnaissance before privilege escalation, avoid noisy exploitation, and limit actions to business hours of the victim’s region. Why is this observation important for attribution?

Options:

A.

It confirms the use of a specific exploit kit

B.

It indicates an advanced persistence mechanism

C.

It reveals operational discipline and intent

D.

It identifies the malware command-and-control protocol

Question 14

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

Options:

A.

Immediately begin a new hypothesis

B.

Document findings and operationalize detections

C.

Disable all affected user accounts

D.

Escalate the incident directly to executive leadership

Question 15

A security team wants to create a plan to protect companies from lateral movement attacks. The team already implemented detection alerts for pass-the-hash and pass-the-ticket techniques. Which two components must be monitored to hunt for lateral movement attacks on endpoints? (Choose two.)

Options:

A.

Use of the runas command

B.

Linux file systems for files that have the setuid/setgid bit set

C.

Use of Windows Remote Management

D.

Creation of scheduled task events

E.

Use of tools and commands to connect to remote shares

Question 16

A SOC using Cisco security technologies wants to measure the success of its threat hunting program over time. Which metric BEST reflects increased threat hunting maturity?

Options:

A.

Number of alerts generated per day

B.

Volume of threat intelligence feeds ingested

C.

Reduction in attacker dwell time

D.

Number of blocked IP addresses

Question 17

Refer to the exhibit.

A company recently was breached and decided to improve their security posture going forward. A security assessment was ordered, specifically intended to test weak points exploited during the breach. A security analyst reviews server logs to identify activities related to the aforementioned security assessment. Which entry suggests a delivery method associated with authorized assessment?

Options:

A.

Login test at scale using "AuthCheck/4.1" and leaked credentials.

B.

Using "SecurityScan/2.5" to access all /admin endpoints.

C.

Exploitation via "ExploitTest/2.0" using a shutdown command.

D.

Scan via "WebCrawler/1.0" to gather public-facing information.

Question 18

A security architect is designing a threat model for a multi-tier cloud application that includes public APIs, backend microservices, and an identity provider. The goal is to identify how an attacker could chain multiple weaknesses together to achieve account takeover and data exfiltration. Which threat modeling technique is MOST appropriate?

Options:

A.

STRIDE analysis to enumerate threat categories per component

B.

CVSS scoring to prioritize vulnerabilities by severity

C.

Attack trees to model adversary objectives and paths

D.

DREAD scoring to assess impact and exploitability

Page: 1 / 5
Total 60 questions