Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

300-220 Cisco Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Cisco 300-220 Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

A SOC analyst is usingCisco Secure Network Analytics (Stealthwatch)to hunt for command-and-control (C2) activity across the enterprise. The analyst wants to identify stealthy C2 channels that intentionally avoid known malicious IP addresses and domains. Which Stealthwatch hunting approach BEST supports this objective?

A.

Blocking outbound traffic to known C2 IP addresses

B.

Monitoring NetFlow records for abnormal beaconing patterns

C.

Reviewing firewall deny logs for suspicious connections

D.

Relying on threat intelligence feeds for C2 indicators

A threat hunter is asked to model how an attacker could abuse cloud identity misconfigurations to escalate privileges without exploiting software vulnerabilities. Which modeling approach BEST supports this analysis?

A.

STRIDE focused on spoofing and elevation of privilege

B.

Kill Chain analysis focused on malware execution

C.

Attack path analysis using identity relationships

D.

CVSS scoring of IAM misconfigurations

Which hunting technique is MOST effective for detecting stealthy data exfiltration over standard web protocols?

A.

Hash-based malware detection

B.

Behavioral analysis of outbound traffic patterns

C.

Blocking known malicious IP addresses

D.

Signature-based IDS rules

A security team wants to create a plan to protect companies from lateral movement attacks. The team already implemented detection alerts for pass-the-hash and pass-the-ticket techniques. Which two components must be monitored to hunt for lateral movement attacks on endpoints? (Choose two.)

A.

Use of the runas command

B.

Linux file systems for files that have the setuid/setgid bit set

C.

Use of Windows Remote Management

D.

Creation of scheduled task events

E.

Use of tools and commands to connect to remote shares

A Cisco-focused SOC wants to move detection coverage higher on thePyramid of Pain. Which hunting outcome BEST supports this objective?

A.

Blocking known malicious domains using Cisco Secure Web Appliance

B.

Detecting abnormal authentication behavior across VPN and cloud access

C.

Creating alerts for malware hashes from Talos feeds

D.

Quarantining infected endpoints automatically

During multiple investigations using Cisco telemetry, analysts observe attackers consistently perform internal discovery before privilege escalation and avoid high-risk actions. Why is this observation useful for attribution?

A.

It confirms the attacker used a known exploit

B.

It reveals the attacker’s malware development skills

C.

It indicates disciplined and methodical tradecraft

D.

It identifies the attacker’s command-and-control server

Refer to the exhibit.

A forensic team must investigate how the company website was defaced. The team isolates the web server, clones the disk, and analyzes the logs. Which technique was used by the attacker initially to access the website?

A.

exploit public-facing application

B.

external remote services

C.

command and scripting interpreter

D.

drive-by compromise

A threat hunter completes a structured hunt and confirms malicious lateral movement within the environment. Which action BEST ensures the hunt contributes to long-term defensive improvement?

A.

Escalating the incident to executive leadership

B.

Resetting credentials for all affected users

C.

Documenting findings and updating detection logic

D.

Continuing to monitor the activity for additional evidence

The security team detects an alert regarding a potentially malicious file namedFinancial_Data_526280622.pdfdownloaded by a user. Upon reviewing SIEM logs and Cisco Secure Endpoint, the team confirms that the file was obtained from an untrusted website. The hash analysis of the file returns an unknown status. Which action must be done next?

A.

Submit the file for sandboxing.

B.

Review the directory path where the file is stored.

C.

Run a complete malware scan on the user's workstation.

D.

Investigate the reputation of the untrusted website.

A SOC team must prepare for a new phishing campaign that tricks users into clicking a malicious URL to download a file. When the file executes, it creates a Windows process that harvests user credentials. The team must configure the SIEM tool to receive an alert if a suspicious process is detected. Which two rules must the team create in the SIEM tool? (Choose two.)

A.

Rule that detects processes created by the users

B.

Rule that detects processes in nonstandard file paths

C.

Rule that detects common processes that have modified names

D.

Rule that detects changes in process ownership

E.

Rule that detects changes in process startup time

A threat hunter wants to detect credential dumping attempts that bypass traditional malware detection. Which telemetry source is MOST effective for this purpose?

A.

Email gateway attachment logs

B.

Endpoint memory access telemetry

C.

DNS query logs

D.

Firewall allow/deny logs

Refer to the exhibit. A penetration test performed against a web application generates the error message. Which two pieces of information are exposed? (Choose two.) Q Internal paths of the web server

A.

service and version of the web server

B.

Apache Jasper is vulnerable to path injection.

C.

technology used by the application

D.

version of the web browser

Refer to the exhibit.

A threat-hunting team makes an EDR query to detect possible C2 outbound communication across all endpoints. Which level of the Pyramid of Pain is being used?

A.

Tough

B.

Challenging

C.

Easy

D.

Simple

Refer to the exhibit. Which technique is used by the attacker?

A.

Perform a preliminary check to verify if the victim has already been compromised.

B.

Scan using a batch file created on the fly that contains the command.

C.

Use a base64-encoded VBScript that is decoded and executed on the endpoint.

D.

Set up persistence by creating a shortcut for the malicious macro in the user's Startup directory

A mature SOC notices that several incidents over the past year involved attackers abusing legitimate administrative tools rather than deploying custom malware. Leadership asks the threat hunting team to improve detection coverage in a way that increases attacker cost rather than relying on easily replaceable indicators. Which detection strategy best aligns with this objective?

A.

Blocking known malicious file hashes at the endpoint

B.

Correlating attacker behavior across multiple MITRE ATT&CK techniques

C.

Ingesting additional commercial threat intelligence feeds

D.

Creating alerts for newly registered domains

A SOC manager wants to evaluate whether the organization’s Cisco-based threat hunting program is improving over time. Which metric BEST reflects increased threat hunting effectiveness?

A.

Number of alerts generated by Cisco security tools

B.

Reduction in attacker dwell time

C.

Number of blocked IP addresses

D.

Volume of threat intelligence feeds consumed

A structured threat hunt using Cisco Secure Network Analytics confirms abnormal internal SMB traffic consistent with lateral movement. Which action should occur NEXT to improve organizational security posture?

A.

Isolate the affected hosts immediately

B.

Reset all user credentials involved

C.

Document findings and create permanent detections

D.

Continue monitoring until more evidence is collected

A SOC team using Cisco security technologies wants to distinguishIndicators of Attack (IOAs)fromIndicators of Compromise (IOCs)during threat hunting. Which scenario BEST represents an IOA rather than an IOC?

A.

Detection of a known malicious file hash on an endpoint

B.

Identification of a domain listed in a threat intelligence feed

C.

Observation of repeated failed logins followed by a successful login from a new location

D.

Blocking an IP address associated with previous malware campaigns

Page: 1 / 1
Total 60 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved