Spring Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Question and Answers

Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD

Last Update Feb 28, 2026
Total Questions : 60

We are offering FREE 300-220 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-220 free exam questions and then go for complete pool of Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD test questions that will help you more.

300-220 pdf

300-220 PDF

$40.25  $114.99
300-220 Engine

300-220 Testing Engine

$47.25  $134.99
300-220 PDF + Engine

300-220 PDF + Testing Engine

$61.25  $174.99
Questions 1

A security team wants to create a plan to protect companies from lateral movement attacks. The team already implemented detection alerts for pass-the-hash and pass-the-ticket techniques. Which two components must be monitored to hunt for lateral movement attacks on endpoints? (Choose two.)

Options:

A.  

Use of the runas command

B.  

Linux file systems for files that have the setuid/setgid bit set

C.  

Use of Windows Remote Management

D.  

Creation of scheduled task events

E.  

Use of tools and commands to connect to remote shares

Discussion 0
Questions 2

A mature SOC notices that several incidents over the past year involved attackers abusing legitimate administrative tools rather than deploying custom malware. Leadership asks the threat hunting team to improve detection coverage in a way that increases attacker cost rather than relying on easily replaceable indicators. Which detection strategy best aligns with this objective?

Options:

A.  

Blocking known malicious file hashes at the endpoint

B.  

Correlating attacker behavior across multiple MITRE ATT&CK techniques

C.  

Ingesting additional commercial threat intelligence feeds

D.  

Creating alerts for newly registered domains

Discussion 0
Questions 3

A SOC analyst using Cisco security tools wants to differentiatethreat huntingfromtraditional detection engineering. Which activity BEST represents threat hunting rather than detection engineering?

Options:

A.  

Creating a SIEM rule to alert on known malicious domains

B.  

Tuning EDR alerts to reduce false positives

C.  

Formulating a hypothesis to search for credential misuse without alerts

D.  

Blocking IP addresses based on Talos intelligence

Discussion 0
Questions 4

While investigating multiple incidents, analysts notice that attackers consistently use SMB for lateral movement and avoid PowerShell execution. Why is this observation valuable for attribution?

Options:

A.  

It identifies the exploit used for initial access

B.  

It reveals the attacker’s malware development framework

C.  

It highlights consistent attacker tradecraft

D.  

It confirms data exfiltration techniques

Discussion 0
Questions 5

Refer to the exhibit.

An analyst is evaluating artifacts and logs collected from recent breach. In the logs, ATP established persistency of malware by placing a path to the executable in a specific registry entry. What is the difference between the ATP's approach and using HKEY LOCAL MACHINE\Software\Microsoft\Windows\CurrentVersion\Run instead?

Options:

A.  

The key is available only on older versions of Windows and is not supported in newer ones.

B.  

Entries in this key are automatically removed after a system restart, which prevents persistence.

C.  

Modifying this key requires administrative privileges, which the malware might not have.

D.  

This key is meant for system settings and not for storing startup program entries.

Discussion 0
Questions 6

A security architect is designing a threat model for a multi-tier cloud application that includes public APIs, backend microservices, and an identity provider. The goal is to identify how an attacker could chain multiple weaknesses together to achieve account takeover and data exfiltration. Which threat modeling technique is MOST appropriate?

Options:

A.  

STRIDE analysis to enumerate threat categories per component

B.  

CVSS scoring to prioritize vulnerabilities by severity

C.  

Attack trees to model adversary objectives and paths

D.  

DREAD scoring to assess impact and exploitability

Discussion 0
Questions 7

Refer to the exhibit. Which technique is used by the attacker?

Options:

A.  

Perform a preliminary check to verify if the victim has already been compromised.

B.  

Scan using a batch file created on the fly that contains the command.

C.  

Use a base64-encoded VBScript that is decoded and executed on the endpoint.

D.  

Set up persistence by creating a shortcut for the malicious macro in the user's Startup directory

Discussion 0
Questions 8

While analyzing telemetry from Cisco Secure Endpoint and Secure Network Analytics, analysts observe that an adversary consistently avoids deploying malware and instead abuses built-in administrative tools. Why does this observation matter for attribution?

Options:

A.  

It identifies the specific exploit used

B.  

It indicates the attacker is using outdated tools

C.  

It reveals consistent attacker tradecraft across incidents

D.  

It confirms the presence of ransomware

Discussion 0
Questions 9

What triggers unstructured threat hunting?

Options:

A.  

Indicators of compromise

B.  

Tactics, techniques, and procedures

C.  

Customized threat identification

D.  

Indicators of attack

Discussion 0
Questions 10

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

Options:

A.  

Immediately begin a new hypothesis

B.  

Document findings and operationalize detections

C.  

Disable all affected user accounts

D.  

Escalate the incident directly to executive leadership

Discussion 0
Questions 11

Which hunting technique is MOST effective for detecting stealthy data exfiltration over standard web protocols?

Options:

A.  

Hash-based malware detection

B.  

Behavioral analysis of outbound traffic patterns

C.  

Blocking known malicious IP addresses

D.  

Signature-based IDS rules

Discussion 0
Questions 12

A security team is performing threat modeling for a hybrid environment consisting of on-prem Active Directory and Azure AD. The team wants to identify how an attacker could move from a compromised cloud identity to full on-prem domain dominance. Which modeling focus is MOST appropriate?

Options:

A.  

Enumerating CVEs affecting domain controllers

B.  

Mapping trust relationships between identity systems

C.  

Assigning CVSS scores to authentication mechanisms

D.  

Conducting packet-level network flow analysis

Discussion 0
Questions 13

According to the MITRE ATT&CK framework, how is the password spraying technique classified?

Options:

A.  

Privilege escalation

B.  

Initial access

C.  

Lateral movement

D.  

Credential access

Discussion 0
Questions 14

The SOC team receives an alert about a user sign-in from an unusual country. After investigating the SIEM logs, the team confirms the user never signed in from that country. The incident is reported to the IT administrator who resets the user's password. Which threat hunting phase was initially used?

Options:

A.  

Collect and process intelligence and data

B.  

Response and resolution

C.  

Hypothesis

D.  

Post-incident review

Discussion 0
Questions 15

Refer to the exhibit. A penetration test performed against a web application generates the error message. Which two pieces of information are exposed? (Choose two.) Q Internal paths of the web server

Options:

A.  

service and version of the web server

B.  

Apache Jasper is vulnerable to path injection.

C.  

technology used by the application

D.  

version of the web browser

Discussion 0
Questions 16

The security team detects an alert regarding a potentially malicious file namedFinancial_Data_526280622.pdfdownloaded by a user. Upon reviewing SIEM logs and Cisco Secure Endpoint, the team confirms that the file was obtained from an untrusted website. The hash analysis of the file returns an unknown status. Which action must be done next?

Options:

A.  

Submit the file for sandboxing.

B.  

Review the directory path where the file is stored.

C.  

Run a complete malware scan on the user's workstation.

D.  

Investigate the reputation of the untrusted website.

Discussion 0
Questions 17

A threat hunter is asked to model how an attacker could abuse cloud identity misconfigurations to escalate privileges without exploiting software vulnerabilities. Which modeling approach BEST supports this analysis?

Options:

A.  

STRIDE focused on spoofing and elevation of privilege

B.  

Kill Chain analysis focused on malware execution

C.  

Attack path analysis using identity relationships

D.  

CVSS scoring of IAM misconfigurations

Discussion 0
Questions 18

A threat hunter wants to detect credential dumping attempts that bypass traditional malware detection. Which telemetry source is MOST effective for this purpose?

Options:

A.  

Email gateway attachment logs

B.  

Endpoint memory access telemetry

C.  

DNS query logs

D.  

Firewall allow/deny logs

Discussion 0