Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

300-220 Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Questions and Answers

Questions 4

During multiple intrusions, analysts observe that attackers consistently perform internal reconnaissance before privilege escalation, avoid noisy exploitation, and limit actions to business hours of the victim’s region. Why is this observation important for attribution?

Options:

A.

It confirms the use of a specific exploit kit

B.

It indicates an advanced persistence mechanism

C.

It reveals operational discipline and intent

D.

It identifies the malware command-and-control protocol

Buy Now
Questions 5

A Cisco-focused SOC wants to move detection coverage higher on thePyramid of Pain. Which hunting outcome BEST supports this objective?

Options:

A.

Blocking known malicious domains using Cisco Secure Web Appliance

B.

Detecting abnormal authentication behavior across VPN and cloud access

C.

Creating alerts for malware hashes from Talos feeds

D.

Quarantining infected endpoints automatically

Buy Now
Questions 6

A SOC team must prepare for a new phishing campaign that tricks users into clicking a malicious URL to download a file. When the file executes, it creates a Windows process that harvests user credentials. The team must configure the SIEM tool to receive an alert if a suspicious process is detected. Which two rules must the team create in the SIEM tool? (Choose two.)

Options:

A.

Rule that detects processes created by the users

B.

Rule that detects processes in nonstandard file paths

C.

Rule that detects common processes that have modified names

D.

Rule that detects changes in process ownership

E.

Rule that detects changes in process startup time

Buy Now
Questions 7

The Security Operations Center team at a company detects a successful VPN connection from a country outside the known countries of operation. After the connection occurs, the team receives multiple triggers from the same source IP address about file access and modifications to the file server. The team concludes that this is a case of data exfiltration from an unknown adversary through a compromised user account. To find other potential actions taken by the adversary, which type of threat hunting should be used?

Options:

A.

Unstructured

B.

AI-driven

C.

Proactive

D.

Structured

Buy Now
Questions 8

Which hunting technique is MOST effective for detecting stealthy data exfiltration over standard web protocols?

Options:

A.

Hash-based malware detection

B.

Behavioral analysis of outbound traffic patterns

C.

Blocking known malicious IP addresses

D.

Signature-based IDS rules

Buy Now
Questions 9

A security analyst receives an alert that host A, which has an IP address of 192.168.5.39, has a new browser extension installed. During an investigation of the SIEM tool logs, the analyst discovers that host A made continuous TCP connections to an IP address of 1.25.241.8 via TCP port 80. The 1.25.241.8 IP address is categorized as a C2 server. Which action should the analyst take to mitigate similar connections in the future?

Options:

A.

Configure a browser extension deny list.

B.

Use antivirus software to quarantine suspicious files automatically.

C.

Use Deep Packet Inspection to block malicious domains.

D.

Use IDS to detect and avoid similar connections.

Buy Now
Questions 10

A threat hunter is usingCisco Secure Network Analytics (Stealthwatch)to investigate possible lateral movement inside the network. Which behavior would MOST strongly indicate lateral movement using valid credentials?

Options:

A.

High volume of inbound internet traffic to a web server

B.

Internal systems authenticating to multiple hosts using SMB in a short time

C.

DNS queries to newly registered domains

D.

Repeated HTTP requests to the same external IP address

Buy Now
Questions 11

What is the classification of the pass-the-hash technique according to the MITRE ATT&CK framework?

Options:

A.

Lateral movement

B.

Persistence

C.

Credential access

D.

Privilege escalation

Buy Now
Questions 12

A SOC team wants to detect lateral movement performed using legitimate administrative tools rather than malware. Which telemetry source provides the MOST reliable visibility for this hunting objective?

Options:

A.

Antivirus detection logs

B.

Email security gateway logs

C.

Authentication and remote execution logs

D.

Web proxy URL filtering logs

Buy Now
Questions 13

During an investigation, analysts observe that attackers consistently avoid PowerShell logging, disable AMSI, and prefer WMI for execution. Why is this information critical for attribution?

Options:

A.

It identifies the malware family used

B.

It reveals the attacker’s IP infrastructure

C.

It reflects the attacker’s operational preferences

D.

It confirms the exploit used for initial access

Buy Now
Questions 14

The SOC team receives an alert about a user sign-in from an unusual country. After investigating the SIEM logs, the team confirms the user never signed in from that country. The incident is reported to the IT administrator who resets the user's password. Which threat hunting phase was initially used?

Options:

A.

Collect and process intelligence and data

B.

Response and resolution

C.

Hypothesis

D.

Post-incident review

Buy Now
Questions 15

While analyzing telemetry from Cisco Secure Endpoint and Secure Network Analytics, analysts observe that an adversary consistently avoids deploying malware and instead abuses built-in administrative tools. Why does this observation matter for attribution?

Options:

A.

It identifies the specific exploit used

B.

It indicates the attacker is using outdated tools

C.

It reveals consistent attacker tradecraft across incidents

D.

It confirms the presence of ransomware

Buy Now
Questions 16

A SOC using Cisco security technologies wants to measure the success of its threat hunting program over time. Which metric BEST reflects increased threat hunting maturity?

Options:

A.

Number of alerts generated per day

B.

Volume of threat intelligence feeds ingested

C.

Reduction in attacker dwell time

D.

Number of blocked IP addresses

Buy Now
Questions 17

Refer to the exhibit.

A security team detects a spike in traffic from the company web server. After further investigation, the team discovered that multiple connections have been established from the server to different IP addresses, but the web server logs contain both expected traffic and DDoS traffic. Which attribute must the team use to further filter the logs?

Options:

A.

connection status

B.

destination port

C.

IP address of the web server

D.

protocol

Buy Now
Questions 18

A security architect is designing a threat model for a multi-tier cloud application that includes public APIs, backend microservices, and an identity provider. The goal is to identify how an attacker could chain multiple weaknesses together to achieve account takeover and data exfiltration. Which threat modeling technique is MOST appropriate?

Options:

A.

STRIDE analysis to enumerate threat categories per component

B.

CVSS scoring to prioritize vulnerabilities by severity

C.

Attack trees to model adversary objectives and paths

D.

DREAD scoring to assess impact and exploitability

Buy Now
Exam Code: 300-220
Exam Name: Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD
Last Update: Feb 21, 2026
Questions: 60
300-220 pdf

300-220 PDF

$28.5  $94.99
300-220 Engine

300-220 Testing Engine

$33  $109.99
300-220 PDF + Engine

300-220 PDF + Testing Engine

$43.5  $144.99