Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Cisco 300-220 Online Access

Page: 2 / 5
Total 60 questions

Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Questions and Answers

Question 5

Refer to the exhibit. A penetration test performed against a web application generates the error message. Which two pieces of information are exposed? (Choose two.) Q Internal paths of the web server

Options:

A.

service and version of the web server

B.

Apache Jasper is vulnerable to path injection.

C.

technology used by the application

D.

version of the web browser

Question 6

A security operations team is transitioning from alert-driven investigations to a mature threat hunting program. The team wants to focus on detecting adversaries who intentionally evade signature-based tools and traditional SIEM alerts by using legitimate credentials and native system utilities. Which hunting focus best supports this objective?

Options:

A.

Tracking known malicious IP addresses and domains from threat intelligence feeds

B.

Monitoring endpoint antivirus alerts for malware detections

C.

Analyzing abnormal behavior patterns across identity, endpoint, and network telemetry

D.

Blocking files with known malicious hashes at the firewall

Question 7

Refer to the exhibit.

A company went through several rounds of restructuring and the previous security team has been let go A new engineer joins and rediscovers all the tools thatthe previous team left behind.One of the tools Is a Bash script related to monitoring AWS accounts for threats What is the purpose of the script?

Options:

A.

monitoring failed AWS console login attempts

B.

automating connection to AWS accounts

C.

monitoring for AWS instance errors

D.

archiving records from the ConsoleLogin source

Question 8

A threat hunter usesCisco Secure Network Analytics (Stealthwatch)to identify potential command-and-control traffic. Which characteristic MOST strongly indicates beaconing behavior?

Options:

A.

Large file transfers to external IP addresses

B.

Irregular outbound connections over multiple protocols

C.

Small, periodic outbound connections to a rare destination

D.

High-volume inbound traffic from the internet

Page: 2 / 5
Total 60 questions