Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Changed 300-220 Exam Questions

Page: 3 / 5
Total 60 questions

Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Questions and Answers

Question 9

According to the MITRE ATT&CK framework, how is the password spraying technique classified?

Options:

A.

Privilege escalation

B.

Initial access

C.

Lateral movement

D.

Credential access

Question 10

A mature SOC notices that several incidents over the past year involved attackers abusing legitimate administrative tools rather than deploying custom malware. Leadership asks the threat hunting team to improve detection coverage in a way that increases attacker cost rather than relying on easily replaceable indicators. Which detection strategy best aligns with this objective?

Options:

A.

Blocking known malicious file hashes at the endpoint

B.

Correlating attacker behavior across multiple MITRE ATT&CK techniques

C.

Ingesting additional commercial threat intelligence feeds

D.

Creating alerts for newly registered domains

Question 11

Refer to the exhibit.

The cybersecurity team at a company detects an ongoing attack directed at the web server that hosts the company website. The team analyzes the logs of the web application firewall and discovers several HTTP requests encoded in Base64. The team decodes the payloads and retrieves the HTTP requests. What did the attackers use to exploit the server?

Options:

A.

Unicode encoding

B.

SQL injection

C.

directory traversal

D.

cross-site scripting (XSS)

Question 12

A SOC repeatedly discovers similar attacker behaviors during separate hunts, indicating recurring detection gaps. What process change MOST effectively prevents rediscovery of the same threats?

Options:

A.

Increasing analyst staffing

B.

Automating hunt execution

C.

Converting hunt findings into permanent detections

D.

Conducting more frequent unstructured hunts

Page: 3 / 5
Total 60 questions