Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

300-220 Leak Questions

Page: 5 / 5
Total 60 questions

Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Questions and Answers

Question 17

Refer to the exhibit.

A company recently was breached and decided to improve their security posture going forward. A security assessment was ordered, specifically intended to test weak points exploited during the breach. A security analyst reviews server logs to identify activities related to the aforementioned security assessment. Which entry suggests a delivery method associated with authorized assessment?

Options:

A.

Login test at scale using "AuthCheck/4.1" and leaked credentials.

B.

Using "SecurityScan/2.5" to access all /admin endpoints.

C.

Exploitation via "ExploitTest/2.0" using a shutdown command.

D.

Scan via "WebCrawler/1.0" to gather public-facing information.

Question 18

A security architect is designing a threat model for a multi-tier cloud application that includes public APIs, backend microservices, and an identity provider. The goal is to identify how an attacker could chain multiple weaknesses together to achieve account takeover and data exfiltration. Which threat modeling technique is MOST appropriate?

Options:

A.

STRIDE analysis to enumerate threat categories per component

B.

CVSS scoring to prioritize vulnerabilities by severity

C.

Attack trees to model adversary objectives and paths

D.

DREAD scoring to assess impact and exploitability

Page: 5 / 5
Total 60 questions