Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Last Attempt 300-220 Questions

Page: 4 / 5
Total 60 questions

Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Questions and Answers

Question 13

During multiple intrusions, analysts observe that attackers consistently perform internal reconnaissance before privilege escalation, avoid noisy exploitation, and limit actions to business hours of the victim’s region. Why is this observation important for attribution?

Options:

A.

It confirms the use of a specific exploit kit

B.

It indicates an advanced persistence mechanism

C.

It reveals operational discipline and intent

D.

It identifies the malware command-and-control protocol

Question 14

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

Options:

A.

Immediately begin a new hypothesis

B.

Document findings and operationalize detections

C.

Disable all affected user accounts

D.

Escalate the incident directly to executive leadership

Question 15

A security team wants to create a plan to protect companies from lateral movement attacks. The team already implemented detection alerts for pass-the-hash and pass-the-ticket techniques. Which two components must be monitored to hunt for lateral movement attacks on endpoints? (Choose two.)

Options:

A.

Use of the runas command

B.

Linux file systems for files that have the setuid/setgid bit set

C.

Use of Windows Remote Management

D.

Creation of scheduled task events

E.

Use of tools and commands to connect to remote shares

Question 16

A SOC using Cisco security technologies wants to measure the success of its threat hunting program over time. Which metric BEST reflects increased threat hunting maturity?

Options:

A.

Number of alerts generated per day

B.

Volume of threat intelligence feeds ingested

C.

Reduction in attacker dwell time

D.

Number of blocked IP addresses

Page: 4 / 5
Total 60 questions