Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-220 - Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD

Page: 1 / 2
Total 60 questions

During multiple investigations using Cisco telemetry, analysts observe attackers consistently perform internal discovery before privilege escalation and avoid high-risk actions. Why is this observation useful for attribution?

A.

It confirms the attacker used a known exploit

B.

It reveals the attacker’s malware development skills

C.

It indicates disciplined and methodical tradecraft

D.

It identifies the attacker’s command-and-control server

Refer to the exhibit.

An analyst is evaluating artifacts and logs collected from recent breach. In the logs, ATP established persistency of malware by placing a path to the executable in a specific registry entry. What is the difference between the ATP's approach and using HKEY LOCAL MACHINE\Software\Microsoft\Windows\CurrentVersion\Run instead?

A.

The key is available only on older versions of Windows and is not supported in newer ones.

B.

Entries in this key are automatically removed after a system restart, which prevents persistence.

C.

Modifying this key requires administrative privileges, which the malware might not have.

D.

This key is meant for system settings and not for storing startup program entries.

A SOC using Cisco security technologies wants to measure the success of its threat hunting program over time. Which metric BEST reflects increased threat hunting maturity?

A.

Number of alerts generated per day

B.

Volume of threat intelligence feeds ingested

C.

Reduction in attacker dwell time

D.

Number of blocked IP addresses

A security team wants to create a plan to protect companies from lateral movement attacks. The team already implemented detection alerts for pass-the-hash and pass-the-ticket techniques. Which two components must be monitored to hunt for lateral movement attacks on endpoints? (Choose two.)

A.

Use of the runas command

B.

Linux file systems for files that have the setuid/setgid bit set

C.

Use of Windows Remote Management

D.

Creation of scheduled task events

E.

Use of tools and commands to connect to remote shares

Refer to the exhibit.

A company went through several rounds of restructuring and the previous security team has been let go A new engineer joins and rediscovers all the tools thatthe previous team left behind.One of the tools Is a Bash script related to monitoring AWS accounts for threats What is the purpose of the script?

A.

monitoring failed AWS console login attempts

B.

automating connection to AWS accounts

C.

monitoring for AWS instance errors

D.

archiving records from the ConsoleLogin source

While investigating multiple incidents, analysts notice that attackers consistently use SMB for lateral movement and avoid PowerShell execution. Why is this observation valuable for attribution?

A.

It identifies the exploit used for initial access

B.

It reveals the attacker’s malware development framework

C.

It highlights consistent attacker tradecraft

D.

It confirms data exfiltration techniques

Refer to the exhibit.

A security analyst receives an alert from Cisco Secure Network Analytics (formerly StealthWatch) with the C2 category. Which information aids the investigation?

A.

The number of packets shows that a C2 communication occurred.

B.

IP address 10.201.3.99 is a C2 server.

C.

Host 10.201.3.99 is attempting to contact the C2 server to retrieve the payload.

D.

The payload describes the address of the zombie endpoint.

Which hunting technique is MOST effective for detecting stealthy data exfiltration over standard web protocols?

A.

Hash-based malware detection

B.

Behavioral analysis of outbound traffic patterns

C.

Blocking known malicious IP addresses

D.

Signature-based IDS rules

A threat hunter wants to detect fileless malware activity usingCisco Secure Endpoint. Which behavior would MOST strongly indicate fileless execution?

A.

Executables running from Program Files

B.

Processes spawning from user-writable directories

C.

Legitimate system processes executing encoded commands

D.

Files with unknown hash reputation

A threat hunting team is attempting to attribute a series of intrusions across multiple organizations to a known threat actor. The malware binaries differ across incidents, infrastructure changes frequently, and IP addresses rotate daily. Which evidence provides the STRONGEST basis for confident attribution?

A.

Overlapping IP address ranges used during attacks

B.

Similar malware filenames and hashes

C.

Consistent attacker tradecraft mapped to MITRE ATT&CK

D.

Identical timestamps of attack activity