Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

300-220 Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Questions and Answers

Questions 4

Refer to the exhibit.

A security analyst receives an alert from Cisco Secure Network Analytics (formerly StealthWatch) with the C2 category. Which information aids the investigation?

Options:

A.

The number of packets shows that a C2 communication occurred.

B.

IP address 10.201.3.99 is a C2 server.

C.

Host 10.201.3.99 is attempting to contact the C2 server to retrieve the payload.

D.

The payload describes the address of the zombie endpoint.

Buy Now
Questions 5

A SOC team using Cisco security technologies wants to improve its ability to detect threats that bypass traditional security controls by abusing valid user credentials. Which hunting focus MOST effectively addresses this challenge?

Options:

A.

Monitoring antivirus alerts for malware detections

B.

Tracking file hash reputation from threat intelligence feeds

C.

Analyzing authentication behavior anomalies across users and devices

D.

Blocking newly registered domains at the firewall

Buy Now
Questions 6

A SOC leadership team wants to demonstrate the business value of investing in Cisco-based threat hunting capabilities. Which outcome BEST demonstrates that value?

Options:

A.

Increase in alerts generated by security tools

B.

Reduction in false positives across the SOC

C.

Earlier detection of attacks before data exfiltration

D.

Growth in threat intelligence subscriptions

Buy Now
Questions 7

While analyzing telemetry from Cisco Secure Endpoint and Secure Network Analytics, analysts observe that an adversary consistently avoids deploying malware and instead abuses built-in administrative tools. Why does this observation matter for attribution?

Options:

A.

It identifies the specific exploit used

B.

It indicates the attacker is using outdated tools

C.

It reveals consistent attacker tradecraft across incidents

D.

It confirms the presence of ransomware

Buy Now
Questions 8

A security team is performing threat modeling for a hybrid environment consisting of on-prem Active Directory and Azure AD. The team wants to identify how an attacker could move from a compromised cloud identity to full on-prem domain dominance. Which modeling focus is MOST appropriate?

Options:

A.

Enumerating CVEs affecting domain controllers

B.

Mapping trust relationships between identity systems

C.

Assigning CVSS scores to authentication mechanisms

D.

Conducting packet-level network flow analysis

Buy Now
Questions 9

A SOC team wants to detect lateral movement performed using legitimate administrative tools rather than malware. Which telemetry source provides the MOST reliable visibility for this hunting objective?

Options:

A.

Antivirus detection logs

B.

Email security gateway logs

C.

Authentication and remote execution logs

D.

Web proxy URL filtering logs

Buy Now
Questions 10

Refer to the exhibit.

An increase in company traffic is observed by the SOC team. After they investigate the spike, it is concluded that the increase is due to ongoing scanning activity. Further analysis reveals that an adversary used Nmap for OS fingerprinting. Which type of indicators used by the adversary sits highest on the Pyramid of Pain?

Options:

A.

UDPs

B.

port probes

C.

network/host artifacts

D.

IP addresses

Buy Now
Questions 11

Refer to the exhibit.

A company went through several rounds of restructuring and the previous security team has been let go A new engineer joins and rediscovers all the tools thatthe previous team left behind.One of the tools Is a Bash script related to monitoring AWS accounts for threats What is the purpose of the script?

Options:

A.

monitoring failed AWS console login attempts

B.

automating connection to AWS accounts

C.

monitoring for AWS instance errors

D.

archiving records from the ConsoleLogin source

Buy Now
Questions 12

During multiple investigations using Cisco telemetry, analysts observe attackers consistently perform internal discovery before privilege escalation and avoid high-risk actions. Why is this observation useful for attribution?

Options:

A.

It confirms the attacker used a known exploit

B.

It reveals the attacker’s malware development skills

C.

It indicates disciplined and methodical tradecraft

D.

It identifies the attacker’s command-and-control server

Buy Now
Questions 13

During an investigation, analysts observe that attackers consistently avoid PowerShell logging, disable AMSI, and prefer WMI for execution. Why is this information critical for attribution?

Options:

A.

It identifies the malware family used

B.

It reveals the attacker’s IP infrastructure

C.

It reflects the attacker’s operational preferences

D.

It confirms the exploit used for initial access

Buy Now
Questions 14

A SOC manager wants to evaluate whether the organization’s Cisco-based threat hunting program is improving over time. Which metric BEST reflects increased threat hunting effectiveness?

Options:

A.

Number of alerts generated by Cisco security tools

B.

Reduction in attacker dwell time

C.

Number of blocked IP addresses

D.

Volume of threat intelligence feeds consumed

Buy Now
Questions 15

Refer to the exhibit. A cybersecurity team receives an alert from its Intrusion Prevention System about multiple file changes to a file server. Before the changes were made, the team detected a successful remote sign-in from a user account to the server. Which type of threat occurred?

Options:

A.

white box penetration test

B.

authorized penetration test

C.

unauthorized penetration test

D.

black box penetration test

Buy Now
Questions 16

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

Options:

A.

Immediately begin a new hypothesis

B.

Document findings and operationalize detections

C.

Disable all affected user accounts

D.

Escalate the incident directly to executive leadership

Buy Now
Questions 17

A structured threat hunt using Cisco Secure Network Analytics confirms abnormal internal SMB traffic consistent with lateral movement. Which action should occur NEXT to improve organizational security posture?

Options:

A.

Isolate the affected hosts immediately

B.

Reset all user credentials involved

C.

Document findings and create permanent detections

D.

Continue monitoring until more evidence is collected

Buy Now
Questions 18

After a multi-week threat hunting exercise, a security team confirms that an attacker gained access using valid credentials, moved laterally, and exfiltrated data without deploying malware. Senior leadership asks how the hunting program reduced organizational risk. Which outcome BEST demonstrates the value of threat hunting?

Options:

A.

Identification of the attacker’s IP addresses and domains

B.

Discovery of unknown attacker behaviors and closure of detection gaps

C.

Removal of malicious files from compromised hosts

D.

Resetting credentials for affected users

Buy Now
Exam Code: 300-220
Exam Name: Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD
Last Update: Feb 21, 2026
Questions: 60
300-220 pdf

300-220 PDF

$28.5  $94.99
300-220 Engine

300-220 Testing Engine

$33  $109.99
300-220 PDF + Engine

300-220 PDF + Testing Engine

$43.5  $144.99