Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 300-220 Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Exam Practice Test

Page: 1 / 6
Total 60 questions

Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Questions and Answers

Question 1

A SOC leadership team wants to demonstrate the business value of investing in Cisco-based threat hunting capabilities. Which outcome BEST demonstrates that value?

Options:

A.

Increase in alerts generated by security tools

B.

Reduction in false positives across the SOC

C.

Earlier detection of attacks before data exfiltration

D.

Growth in threat intelligence subscriptions

Question 2

Refer to the exhibit.

Question # 2

An analyst is evaluating artifacts and logs collected from recent breach. In the logs, ATP established persistency of malware by placing a path to the executable in a specific registry entry. What is the difference between the ATP's approach and using HKEY LOCAL MACHINE\Software\Microsoft\Windows\CurrentVersion\Run instead?

Options:

A.

The key is available only on older versions of Windows and is not supported in newer ones.

B.

Entries in this key are automatically removed after a system restart, which prevents persistence.

C.

Modifying this key requires administrative privileges, which the malware might not have.

D.

This key is meant for system settings and not for storing startup program entries.

Question 3

A threat hunter completes a structured hunt and confirms malicious lateral movement within the environment. Which action BEST ensures the hunt contributes to long-term defensive improvement?

Options:

A.

Escalating the incident to executive leadership

B.

Resetting credentials for all affected users

C.

Documenting findings and updating detection logic

D.

Continuing to monitor the activity for additional evidence

Question 4

Refer to the exhibit.

Question # 4

A security analyst receives an alert from Cisco Secure Network Analytics (formerly StealthWatch) with the C2 category. Which information aids the investigation?

Options:

A.

The number of packets shows that a C2 communication occurred.

B.

IP address 10.201.3.99 is a C2 server.

C.

Host 10.201.3.99 is attempting to contact the C2 server to retrieve the payload.

D.

The payload describes the address of the zombie endpoint.

Question 5

A mature SOC notices that several incidents over the past year involved attackers abusing legitimate administrative tools rather than deploying custom malware. Leadership asks the threat hunting team to improve detection coverage in a way that increases attacker cost rather than relying on easily replaceable indicators. Which detection strategy best aligns with this objective?

Options:

A.

Blocking known malicious file hashes at the endpoint

B.

Correlating attacker behavior across multiple MITRE ATT&CK techniques

C.

Ingesting additional commercial threat intelligence feeds

D.

Creating alerts for newly registered domains

Question 6

A security architect is designing a threat model for a multi-tier cloud application that includes public APIs, backend microservices, and an identity provider. The goal is to identify how an attacker could chain multiple weaknesses together to achieve account takeover and data exfiltration. Which threat modeling technique is MOST appropriate?

Options:

A.

STRIDE analysis to enumerate threat categories per component

B.

CVSS scoring to prioritize vulnerabilities by severity

C.

Attack trees to model adversary objectives and paths

D.

DREAD scoring to assess impact and exploitability

Question 7

A SOC team wants to detect lateral movement performed using legitimate administrative tools rather than malware. Which telemetry source provides the MOST reliable visibility for this hunting objective?

Options:

A.

Antivirus detection logs

B.

Email security gateway logs

C.

Authentication and remote execution logs

D.

Web proxy URL filtering logs

Question 8

Refer to the exhibit.

Question # 8

An increase in company traffic is observed by the SOC team. After they investigate the spike, it is concluded that the increase is due to ongoing scanning activity. Further analysis reveals that an adversary used Nmap for OS fingerprinting. Which type of indicators used by the adversary sits highest on the Pyramid of Pain?

Options:

A.

UDPs

B.

port probes

C.

network/host artifacts

D.

IP addresses

Question 9

Refer to the exhibit.

Question # 9

A forensic team must investigate how the company website was defaced. The team isolates the web server, clones the disk, and analyzes the logs. Which technique was used by the attacker initially to access the website?

Options:

A.

exploit public-facing application

B.

external remote services

C.

command and scripting interpreter

D.

drive-by compromise

Question 10

Refer to the exhibit.

Question # 10

A company recently was breached and decided to improve their security posture going forward. A security assessment was ordered, specifically intended to test weak points exploited during the breach. A security analyst reviews server logs to identify activities related to the aforementioned security assessment. Which entry suggests a delivery method associated with authorized assessment?

Options:

A.

Login test at scale using "AuthCheck/4.1" and leaked credentials.

B.

Using "SecurityScan/2.5" to access all /admin endpoints.

C.

Exploitation via "ExploitTest/2.0" using a shutdown command.

D.

Scan via "WebCrawler/1.0" to gather public-facing information.

Question 11

Question # 11

Refer to the exhibit. A cybersecurity team receives an alert from its Intrusion Prevention System about multiple file changes to a file server. Before the changes were made, the team detected a successful remote sign-in from a user account to the server. Which type of threat occurred?

Options:

A.

white box penetration test

B.

authorized penetration test

C.

unauthorized penetration test

D.

black box penetration test

Question 12

A SOC team using Cisco security technologies wants to distinguishIndicators of Attack (IOAs)fromIndicators of Compromise (IOCs)during threat hunting. Which scenario BEST represents an IOA rather than an IOC?

Options:

A.

Detection of a known malicious file hash on an endpoint

B.

Identification of a domain listed in a threat intelligence feed

C.

Observation of repeated failed logins followed by a successful login from a new location

D.

Blocking an IP address associated with previous malware campaigns

Question 13

Which hunting technique is MOST effective for detecting stealthy data exfiltration over standard web protocols?

Options:

A.

Hash-based malware detection

B.

Behavioral analysis of outbound traffic patterns

C.

Blocking known malicious IP addresses

D.

Signature-based IDS rules

Question 14

Refer to the exhibit.

Question # 14

The cybersecurity team at a company detects an ongoing attack directed at the web server that hosts the company website. The team analyzes the logs of the web application firewall and discovers several HTTP requests encoded in Base64. The team decodes the payloads and retrieves the HTTP requests. What did the attackers use to exploit the server?

Options:

A.

Unicode encoding

B.

SQL injection

C.

directory traversal

D.

cross-site scripting (XSS)

Question 15

While investigating multiple incidents, analysts notice that attackers consistently use SMB for lateral movement and avoid PowerShell execution. Why is this observation valuable for attribution?

Options:

A.

It identifies the exploit used for initial access

B.

It reveals the attacker’s malware development framework

C.

It highlights consistent attacker tradecraft

D.

It confirms data exfiltration techniques

Question 16

What is a limitation of automated dynamic malware analysis tools?

Options:

A.

Vulnerabilities in runtime environments cannot be found.

B.

They produce false positives and false negatives.

C.

All programming languages are not supported.

D.

They are time consuming when performed manually.

Question 17

A threat hunter usesCisco Secure Endpointto investigate a suspected credential-harvesting attack that does not involve dropping files to disk. Which capability is MOST critical for detecting this activity?

Options:

A.

File hash reputation scoring

B.

Endpoint process ancestry tracking

C.

Email attachment sandboxing

D.

URL category filtering

Question 18

The SOC team receives an alert about a user sign-in from an unusual country. After investigating the SIEM logs, the team confirms the user never signed in from that country. The incident is reported to the IT administrator who resets the user's password. Which threat hunting phase was initially used?

Options:

A.

Collect and process intelligence and data

B.

Response and resolution

C.

Hypothesis

D.

Post-incident review

Page: 1 / 6
Total 60 questions