Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-220 - Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD

Page: 2 / 2
Total 60 questions

While investigating multiple incidents using Cisco telemetry, analysts notice that attackers consistently use valid credentials, avoid malware, and rely on remote management protocols. Why is this information valuable for attribution?

A.

It identifies the attacker’s malware toolkit

B.

It reveals the attacker’s infrastructure providers

C.

It exposes consistent attacker tradecraft

D.

It confirms exploitation of a zero-day vulnerability

Refer to the exhibit.

An increase in company traffic is observed by the SOC team. After they investigate the spike, it is concluded that the increase is due to ongoing scanning activity. Further analysis reveals that an adversary used Nmap for OS fingerprinting. Which type of indicators used by the adversary sits highest on the Pyramid of Pain?

A.

UDPs

B.

port probes

C.

network/host artifacts

D.

IP addresses

Refer to the exhibit.

A security team detects a spike in traffic from the company web server. After further investigation, the team discovered that multiple connections have been established from the server to different IP addresses, but the web server logs contain both expected traffic and DDoS traffic. Which attribute must the team use to further filter the logs?

A.

connection status

B.

destination port

C.

IP address of the web server

D.

protocol

Refer to the exhibit.

A security engineer notices that a Windows Batch script includes calls to suspicious APIs. How will the script affect the system when it is executed?

A.

The internet connection is disabled.

B.

The host version is retrieved.

C.

The host is put in sleep mode.

D.

Files are encrypted.

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

A.

Immediately begin a new hypothesis

B.

Document findings and operationalize detections

C.

Disable all affected user accounts

D.

Escalate the incident directly to executive leadership

A mature SOC notices that several incidents over the past year involved attackers abusing legitimate administrative tools rather than deploying custom malware. Leadership asks the threat hunting team to improve detection coverage in a way that increases attacker cost rather than relying on easily replaceable indicators. Which detection strategy best aligns with this objective?

A.

Blocking known malicious file hashes at the endpoint

B.

Correlating attacker behavior across multiple MITRE ATT&CK techniques

C.

Ingesting additional commercial threat intelligence feeds

D.

Creating alerts for newly registered domains

What is the classification of the pass-the-hash technique according to the MITRE ATT&CK framework?

A.

Lateral movement

B.

Persistence

C.

Credential access

D.

Privilege escalation

During multiple intrusions, analysts observe that attackers consistently perform internal reconnaissance before privilege escalation, avoid noisy exploitation, and limit actions to business hours of the victim’s region. Why is this observation important for attribution?

A.

It confirms the use of a specific exploit kit

B.

It indicates an advanced persistence mechanism

C.

It reveals operational discipline and intent

D.

It identifies the malware command-and-control protocol