Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = pass65

Pass the Cisco Certified Specialist - Threat Hunting and Defending 300-220 Questions and answers with Dumpstech

Exam 300-220 Premium Access

View all detail and faqs for the 300-220 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

The security team detects an alert regarding a potentially malicious file namedFinancial_Data_526280622.pdfdownloaded by a user. Upon reviewing SIEM logs and Cisco Secure Endpoint, the team confirms that the file was obtained from an untrusted website. The hash analysis of the file returns an unknown status. Which action must be done next?

Options:

A.

Submit the file for sandboxing.

B.

Review the directory path where the file is stored.

C.

Run a complete malware scan on the user's workstation.

D.

Investigate the reputation of the untrusted website.

Questions # 2:

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

Options:

A.

Immediately begin a new hypothesis

B.

Document findings and operationalize detections

C.

Disable all affected user accounts

D.

Escalate the incident directly to executive leadership

Questions # 3:

Refer to the exhibit.

Question # 3

A security team detects a spike in traffic from the company web server. After further investigation, the team discovered that multiple connections have been established from the server to different IP addresses, but the web server logs contain both expected traffic and DDoS traffic. Which attribute must the team use to further filter the logs?

Options:

A.

connection status

B.

destination port

C.

IP address of the web server

D.

protocol

Questions # 4:

The Security Operations Center team at a company detects a successful VPN connection from a country outside the known countries of operation. After the connection occurs, the team receives multiple triggers from the same source IP address about file access and modifications to the file server. The team concludes that this is a case of data exfiltration from an unknown adversary through a compromised user account. To find other potential actions taken by the adversary, which type of threat hunting should be used?

Options:

A.

Unstructured

B.

AI-driven

C.

Proactive

D.

Structured

Questions # 5:

Refer to the exhibit.

Question # 5

An analyst is evaluating artifacts and logs collected from recent breach. In the logs, ATP established persistency of malware by placing a path to the executable in a specific registry entry. What is the difference between the ATP's approach and using HKEY LOCAL MACHINE\Software\Microsoft\Windows\CurrentVersion\Run instead?

Options:

A.

The key is available only on older versions of Windows and is not supported in newer ones.

B.

Entries in this key are automatically removed after a system restart, which prevents persistence.

C.

Modifying this key requires administrative privileges, which the malware might not have.

D.

This key is meant for system settings and not for storing startup program entries.

Questions # 6:

A threat hunting team is attempting to attribute a series of intrusions across multiple organizations to a known threat actor. The malware binaries differ across incidents, infrastructure changes frequently, and IP addresses rotate daily. Which evidence provides the STRONGEST basis for confident attribution?

Options:

A.

Overlapping IP address ranges used during attacks

B.

Similar malware filenames and hashes

C.

Consistent attacker tradecraft mapped to MITRE ATT&CK

D.

Identical timestamps of attack activity

Questions # 7:

A threat hunting team wants to ensure hunts are repeatable, scalable, and less dependent on individual analyst intuition. What is the MOST important process improvement?

Options:

A.

Increasing the number of threat intelligence feeds

B.

Automating alert triage workflows

C.

Standardizing hunt documentation and hypotheses

D.

Blocking all suspicious activity automatically

Questions # 8:

After completing several successful hunts using Cisco Secure Network Analytics and Secure Endpoint, the SOC wants to ensure long-term defensive improvement. Which action BEST represents a mature threat hunting outcome?

Options:

A.

Increasing alert sensitivity across all Cisco security tools

B.

Blocking all suspicious network connections automatically

C.

Converting hunt findings into permanent detection rules

D.

Performing additional ad-hoc hunts weekly

Questions # 9:

A mature SOC notices that several incidents over the past year involved attackers abusing legitimate administrative tools rather than deploying custom malware. Leadership asks the threat hunting team to improve detection coverage in a way that increases attacker cost rather than relying on easily replaceable indicators. Which detection strategy best aligns with this objective?

Options:

A.

Blocking known malicious file hashes at the endpoint

B.

Correlating attacker behavior across multiple MITRE ATT&CK techniques

C.

Ingesting additional commercial threat intelligence feeds

D.

Creating alerts for newly registered domains

Questions # 10:

What triggers unstructured threat hunting?

Options:

A.

Indicators of compromise

B.

Tactics, techniques, and procedures

C.

Customized threat identification

D.

Indicators of attack

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions