Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

300-220 Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD is now Stable and With Pass Result | Test Your Knowledge for Free

300-220 Practice Questions

Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD

Last Update 1 day ago
Total Questions : 60

Dive into our fully updated and stable 300-220 practice test platform, featuring all the latest Cisco Certified Specialist - Threat Hunting and Defending exam questions added this week. Our preparation tool is more than just a Cisco study aid; it's a strategic advantage.

Our Cisco Certified Specialist - Threat Hunting and Defending practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 300-220. Use this test to pinpoint which areas you need to focus your study on.

300-220 PDF

300-220 PDF (Printable)
$55.2
$137.99

300-220 Testing Engine

300-220 PDF (Printable)
$60
$149.99

300-220 PDF + Testing Engine

300-220 PDF (Printable)
$74.8
$186.99
Question # 1

Refer to the exhibit.

Question # 1

The cybersecurity team at a company detects an ongoing attack directed at the web server that hosts the company website. The team analyzes the logs of the web application firewall and discovers several HTTP requests encoded in Base64. The team decodes the payloads and retrieves the HTTP requests. What did the attackers use to exploit the server?

Options:

A.  

Unicode encoding

B.  

SQL injection

C.  

directory traversal

D.  

cross-site scripting (XSS)

Discussion 0
Question # 2

A structured threat hunt using Cisco Secure Network Analytics confirms abnormal internal SMB traffic consistent with lateral movement. Which action should occur NEXT to improve organizational security posture?

Options:

A.  

Isolate the affected hosts immediately

B.  

Reset all user credentials involved

C.  

Document findings and create permanent detections

D.  

Continue monitoring until more evidence is collected

Discussion 0
Question # 3

A SOC team wants to detect lateral movement performed using legitimate administrative tools rather than malware. Which telemetry source provides the MOST reliable visibility for this hunting objective?

Options:

A.  

Antivirus detection logs

B.  

Email security gateway logs

C.  

Authentication and remote execution logs

D.  

Web proxy URL filtering logs

Discussion 0
Question # 4

While analyzing telemetry from Cisco Secure Endpoint and Secure Network Analytics, analysts observe that an adversary consistently avoids deploying malware and instead abuses built-in administrative tools. Why does this observation matter for attribution?

Options:

A.  

It identifies the specific exploit used

B.  

It indicates the attacker is using outdated tools

C.  

It reveals consistent attacker tradecraft across incidents

D.  

It confirms the presence of ransomware

Discussion 0
Question # 5

Refer to the exhibit.

Question # 5

A security analyst receives an alert from Cisco Secure Network Analytics (formerly StealthWatch) with the C2 category. Which information aids the investigation?

Options:

A.  

The number of packets shows that a C2 communication occurred.

B.  

IP address 10.201.3.99 is a C2 server.

C.  

Host 10.201.3.99 is attempting to contact the C2 server to retrieve the payload.

D.  

The payload describes the address of the zombie endpoint.

Discussion 0
Question # 6

A threat hunter usesCisco Secure Network Analytics (Stealthwatch)to identify potential command-and-control traffic. Which characteristic MOST strongly indicates beaconing behavior?

Options:

A.  

Large file transfers to external IP addresses

B.  

Irregular outbound connections over multiple protocols

C.  

Small, periodic outbound connections to a rare destination

D.  

High-volume inbound traffic from the internet

Discussion 0
Question # 7

Refer to the exhibit.

Question # 7

An analyst is evaluating artifacts and logs collected from recent breach. In the logs, ATP established persistency of malware by placing a path to the executable in a specific registry entry. What is the difference between the ATP's approach and using HKEY LOCAL MACHINE\Software\Microsoft\Windows\CurrentVersion\Run instead?

Options:

A.  

The key is available only on older versions of Windows and is not supported in newer ones.

B.  

Entries in this key are automatically removed after a system restart, which prevents persistence.

C.  

Modifying this key requires administrative privileges, which the malware might not have.

D.  

This key is meant for system settings and not for storing startup program entries.

Discussion 0
Question # 8

A SOC manager wants to evaluate whether the organization’s Cisco-based threat hunting program is improving over time. Which metric BEST reflects increased threat hunting effectiveness?

Options:

A.  

Number of alerts generated by Cisco security tools

B.  

Reduction in attacker dwell time

C.  

Number of blocked IP addresses

D.  

Volume of threat intelligence feeds consumed

Discussion 0
Question # 9

A security team is performing threat modeling for a hybrid environment consisting of on-prem Active Directory and Azure A

D.  

The team wants to identify how an attacker could move from a compromised cloud identity to full on-prem domain dominance. Which modeling focus is MOST appropriate?

Options:

A.  

Enumerating CVEs affecting domain controllers

B.  

Mapping trust relationships between identity systems

C.  

Assigning CVSS scores to authentication mechanisms

D.  

Conducting packet-level network flow analysis

Discussion 0
Question # 10

Refer to the exhibit.

Question # 10

A threat-hunting team makes an EDR query to detect possible C2 outbound communication across all endpoints. Which level of the Pyramid of Pain is being used?

Options:

A.  

Tough

B.  

Challenging

C.  

Easy

D.  

Simple

Discussion 0
Get 300-220 dumps and pass your exam in 24 hours!

Free Exams Sample Questions