Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

300-220 Exam Dumps - Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD

Searching for workable clues to ace the Cisco 300-220 Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s 300-220 PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

A security architect is designing a threat model for a multi-tier cloud application that includes public APIs, backend microservices, and an identity provider. The goal is to identify how an attacker could chain multiple weaknesses together to achieve account takeover and data exfiltration. Which threat modeling technique is MOST appropriate?

A.

STRIDE analysis to enumerate threat categories per component

B.

CVSS scoring to prioritize vulnerabilities by severity

C.

Attack trees to model adversary objectives and paths

D.

DREAD scoring to assess impact and exploitability

Full Access
Question # 10

A SOC team using Cisco security technologies wants to improve its ability to detect threats that bypass traditional security controls by abusing valid user credentials. Which hunting focus MOST effectively addresses this challenge?

A.

Monitoring antivirus alerts for malware detections

B.

Tracking file hash reputation from threat intelligence feeds

C.

Analyzing authentication behavior anomalies across users and devices

D.

Blocking newly registered domains at the firewall

Full Access
Question # 11

A SOC analyst using Cisco security tools wants to differentiatethreat huntingfromtraditional detection engineering. Which activity BEST represents threat hunting rather than detection engineering?

A.

Creating a SIEM rule to alert on known malicious domains

B.

Tuning EDR alerts to reduce false positives

C.

Formulating a hypothesis to search for credential misuse without alerts

D.

Blocking IP addresses based on Talos intelligence

Full Access
Question # 12

A threat hunter usesCisco Secure Endpointto investigate a suspected credential-harvesting attack that does not involve dropping files to disk. Which capability is MOST critical for detecting this activity?

A.

File hash reputation scoring

B.

Endpoint process ancestry tracking

C.

Email attachment sandboxing

D.

URL category filtering

Full Access
Question # 13

A security team wants to create a plan to protect companies from lateral movement attacks. The team already implemented detection alerts for pass-the-hash and pass-the-ticket techniques. Which two components must be monitored to hunt for lateral movement attacks on endpoints? (Choose two.)

A.

Use of the runas command

B.

Linux file systems for files that have the setuid/setgid bit set

C.

Use of Windows Remote Management

D.

Creation of scheduled task events

E.

Use of tools and commands to connect to remote shares

Full Access
Question # 14

Refer to the exhibit.

An increase in company traffic is observed by the SOC team. After they investigate the spike, it is concluded that the increase is due to ongoing scanning activity. Further analysis reveals that an adversary used Nmap for OS fingerprinting. Which type of indicators used by the adversary sits highest on the Pyramid of Pain?

A.

UDPs

B.

port probes

C.

network/host artifacts

D.

IP addresses

Full Access
Question # 15

According to the MITRE ATT&CK framework, how is the password spraying technique classified?

A.

Privilege escalation

B.

Initial access

C.

Lateral movement

D.

Credential access

Full Access
Question # 16

Refer to the exhibit.

A security analyst receives an alert from Cisco Secure Network Analytics (formerly StealthWatch) with the C2 category. Which information aids the investigation?

A.

The number of packets shows that a C2 communication occurred.

B.

IP address 10.201.3.99 is a C2 server.

C.

Host 10.201.3.99 is attempting to contact the C2 server to retrieve the payload.

D.

The payload describes the address of the zombie endpoint.

Full Access
Go to page: