Spring Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Cisco Certified Specialist - Threat Hunting and Defending 300-220 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 300-220 Premium Access

View all detail and faqs for the 300-220 exam


528 Students Passed

89% Average Score

93% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A Cisco-focused SOC wants to move detection coverage higher on thePyramid of Pain. Which hunting outcome BEST supports this objective?

Options:

A.

Blocking known malicious domains using Cisco Secure Web Appliance

B.

Detecting abnormal authentication behavior across VPN and cloud access

C.

Creating alerts for malware hashes from Talos feeds

D.

Quarantining infected endpoints automatically

Questions # 2:

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

Options:

A.

Immediately begin a new hypothesis

B.

Document findings and operationalize detections

C.

Disable all affected user accounts

D.

Escalate the incident directly to executive leadership

Questions # 3:

A threat hunter is usingCisco Secure Network Analytics (Stealthwatch)to investigate possible lateral movement inside the network. Which behavior would MOST strongly indicate lateral movement using valid credentials?

Options:

A.

High volume of inbound internet traffic to a web server

B.

Internal systems authenticating to multiple hosts using SMB in a short time

C.

DNS queries to newly registered domains

D.

Repeated HTTP requests to the same external IP address

Questions # 4:

A SOC using Cisco security technologies wants to measure the success of its threat hunting program over time. Which metric BEST reflects increased threat hunting maturity?

Options:

A.

Number of alerts generated per day

B.

Volume of threat intelligence feeds ingested

C.

Reduction in attacker dwell time

D.

Number of blocked IP addresses

Questions # 5:

A security analyst receives an alert that host A, which has an IP address of 192.168.5.39, has a new browser extension installed. During an investigation of the SIEM tool logs, the analyst discovers that host A made continuous TCP connections to an IP address of 1.25.241.8 via TCP port 80. The 1.25.241.8 IP address is categorized as a C2 server. Which action should the analyst take to mitigate similar connections in the future?

Options:

A.

Configure a browser extension deny list.

B.

Use antivirus software to quarantine suspicious files automatically.

C.

Use Deep Packet Inspection to block malicious domains.

D.

Use IDS to detect and avoid similar connections.

Questions # 6:

A threat hunting team wants to ensure hunts are repeatable, scalable, and less dependent on individual analyst intuition. What is the MOST important process improvement?

Options:

A.

Increasing the number of threat intelligence feeds

B.

Automating alert triage workflows

C.

Standardizing hunt documentation and hypotheses

D.

Blocking all suspicious activity automatically

Questions # 7:

Refer to the exhibit.

Question # 7

A company recently was breached and decided to improve their security posture going forward. A security assessment was ordered, specifically intended to test weak points exploited during the breach. A security analyst reviews server logs to identify activities related to the aforementioned security assessment. Which entry suggests a delivery method associated with authorized assessment?

Options:

A.

Login test at scale using "AuthCheck/4.1" and leaked credentials.

B.

Using "SecurityScan/2.5" to access all /admin endpoints.

C.

Exploitation via "ExploitTest/2.0" using a shutdown command.

D.

Scan via "WebCrawler/1.0" to gather public-facing information.

Questions # 8:

A SOC analyst using Cisco security tools wants to differentiatethreat huntingfromtraditional detection engineering. Which activity BEST represents threat hunting rather than detection engineering?

Options:

A.

Creating a SIEM rule to alert on known malicious domains

B.

Tuning EDR alerts to reduce false positives

C.

Formulating a hypothesis to search for credential misuse without alerts

D.

Blocking IP addresses based on Talos intelligence

Questions # 9:

A threat hunter usesCisco Secure Network Analytics (Stealthwatch)to identify potential command-and-control traffic. Which characteristic MOST strongly indicates beaconing behavior?

Options:

A.

Large file transfers to external IP addresses

B.

Irregular outbound connections over multiple protocols

C.

Small, periodic outbound connections to a rare destination

D.

High-volume inbound traffic from the internet

Questions # 10:

A mature SOC notices that several incidents over the past year involved attackers abusing legitimate administrative tools rather than deploying custom malware. Leadership asks the threat hunting team to improve detection coverage in a way that increases attacker cost rather than relying on easily replaceable indicators. Which detection strategy best aligns with this objective?

Options:

A.

Blocking known malicious file hashes at the endpoint

B.

Correlating attacker behavior across multiple MITRE ATT&CK techniques

C.

Ingesting additional commercial threat intelligence feeds

D.

Creating alerts for newly registered domains

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.