Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-220 Questions and Answers

Question # 6

A threat hunter is performing a structured hunt usingCisco Secure Endpoint (AMP)telemetry to identify credential harvesting activity. Which data source is MOST critical during thedata collection and processing phaseof the hunt?

A.

File reputation scores from Talos

B.

Endpoint process execution and memory access events

C.

Threat intelligence reports from external vendors

D.

User-reported suspicious activity

Full Access
Question # 7

A SOC team using Cisco security technologies wants to improve its ability to detect threats that bypass traditional security controls by abusing valid user credentials. Which hunting focus MOST effectively addresses this challenge?

A.

Monitoring antivirus alerts for malware detections

B.

Tracking file hash reputation from threat intelligence feeds

C.

Analyzing authentication behavior anomalies across users and devices

D.

Blocking newly registered domains at the firewall

Full Access
Question # 8

While analyzing telemetry from Cisco Secure Endpoint and Secure Network Analytics, analysts observe that an adversary consistently avoids deploying malware and instead abuses built-in administrative tools. Why does this observation matter for attribution?

A.

It identifies the specific exploit used

B.

It indicates the attacker is using outdated tools

C.

It reveals consistent attacker tradecraft across incidents

D.

It confirms the presence of ransomware

Full Access
Question # 9

A SOC analyst using Cisco security tools wants to differentiatethreat huntingfromtraditional detection engineering. Which activity BEST represents threat hunting rather than detection engineering?

A.

Creating a SIEM rule to alert on known malicious domains

B.

Tuning EDR alerts to reduce false positives

C.

Formulating a hypothesis to search for credential misuse without alerts

D.

Blocking IP addresses based on Talos intelligence

Full Access
Question # 10

A SOC repeatedly discovers similar attacker behaviors during separate hunts, indicating recurring detection gaps. What process change MOST effectively prevents rediscovery of the same threats?

A.

Increasing analyst staffing

B.

Automating hunt execution

C.

Converting hunt findings into permanent detections

D.

Conducting more frequent unstructured hunts

Full Access
Question # 11

Refer to the exhibit.

A security team detects a spike in traffic from the company web server. After further investigation, the team discovered that multiple connections have been established from the server to different IP addresses, but the web server logs contain both expected traffic and DDoS traffic. Which attribute must the team use to further filter the logs?

A.

connection status

B.

destination port

C.

IP address of the web server

D.

protocol

Full Access
Question # 12

A SOC team must prepare for a new phishing campaign that tricks users into clicking a malicious URL to download a file. When the file executes, it creates a Windows process that harvests user credentials. The team must configure the SIEM tool to receive an alert if a suspicious process is detected. Which two rules must the team create in the SIEM tool? (Choose two.)

A.

Rule that detects processes created by the users

B.

Rule that detects processes in nonstandard file paths

C.

Rule that detects common processes that have modified names

D.

Rule that detects changes in process ownership

E.

Rule that detects changes in process startup time

Full Access
Question # 13

The SOC team receives an alert about a user sign-in from an unusual country. After investigating the SIEM logs, the team confirms the user never signed in from that country. The incident is reported to the IT administrator who resets the user's password. Which threat hunting phase was initially used?

A.

Collect and process intelligence and data

B.

Response and resolution

C.

Hypothesis

D.

Post-incident review

Full Access
Question # 14

Refer to the exhibit. Which technique is used by the attacker?

A.

Perform a preliminary check to verify if the victim has already been compromised.

B.

Scan using a batch file created on the fly that contains the command.

C.

Use a base64-encoded VBScript that is decoded and executed on the endpoint.

D.

Set up persistence by creating a shortcut for the malicious macro in the user's Startup directory

Full Access
Question # 15

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

A.

Immediately begin a new hypothesis

B.

Document findings and operationalize detections

C.

Disable all affected user accounts

D.

Escalate the incident directly to executive leadership

Full Access
Question # 16

A security team is performing threat modeling for a hybrid environment consisting of on-prem Active Directory and Azure AD. The team wants to identify how an attacker could move from a compromised cloud identity to full on-prem domain dominance. Which modeling focus is MOST appropriate?

A.

Enumerating CVEs affecting domain controllers

B.

Mapping trust relationships between identity systems

C.

Assigning CVSS scores to authentication mechanisms

D.

Conducting packet-level network flow analysis

Full Access
Question # 17

Refer to the exhibit.

A forensic team must investigate how the company website was defaced. The team isolates the web server, clones the disk, and analyzes the logs. Which technique was used by the attacker initially to access the website?

A.

exploit public-facing application

B.

external remote services

C.

command and scripting interpreter

D.

drive-by compromise

Full Access
Question # 18

A threat hunting team is attempting to attribute a series of intrusions across multiple organizations to a known threat actor. The malware binaries differ across incidents, infrastructure changes frequently, and IP addresses rotate daily. Which evidence provides the STRONGEST basis for confident attribution?

A.

Overlapping IP address ranges used during attacks

B.

Similar malware filenames and hashes

C.

Consistent attacker tradecraft mapped to MITRE ATT&CK

D.

Identical timestamps of attack activity

Full Access