Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

300-220 Exam Dumps - Cisco Certified Specialist - Threat Hunting and Defending Questions and Answers

Question # 14

A security analyst receives an alert that host A, which has an IP address of 192.168.5.39, has a new browser extension installed. During an investigation of the SIEM tool logs, the analyst discovers that host A made continuous TCP connections to an IP address of 1.25.241.8 via TCP port 80. The 1.25.241.8 IP address is categorized as a C2 server. Which action should the analyst take to mitigate similar connections in the future?

Options:

A.

Configure a browser extension deny list.

B.

Use antivirus software to quarantine suspicious files automatically.

C.

Use Deep Packet Inspection to block malicious domains.

D.

Use IDS to detect and avoid similar connections.

Buy Now
Question # 15

A security architect is designing a threat model for a multi-tier cloud application that includes public APIs, backend microservices, and an identity provider. The goal is to identify how an attacker could chain multiple weaknesses together to achieve account takeover and data exfiltration. Which threat modeling technique is MOST appropriate?

Options:

A.

STRIDE analysis to enumerate threat categories per component

B.

CVSS scoring to prioritize vulnerabilities by severity

C.

Attack trees to model adversary objectives and paths

D.

DREAD scoring to assess impact and exploitability

Buy Now
Question # 16

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

Options:

A.

Immediately begin a new hypothesis

B.

Document findings and operationalize detections

C.

Disable all affected user accounts

D.

Escalate the incident directly to executive leadership

Buy Now
Question # 17

A security team is performing threat modeling for a hybrid environment consisting of on-prem Active Directory and Azure AD. The team wants to identify how an attacker could move from a compromised cloud identity to full on-prem domain dominance. Which modeling focus is MOST appropriate?

Options:

A.

Enumerating CVEs affecting domain controllers

B.

Mapping trust relationships between identity systems

C.

Assigning CVSS scores to authentication mechanisms

D.

Conducting packet-level network flow analysis

Buy Now
Question # 18

A threat hunter completes a structured hunt and confirms malicious lateral movement within the environment. Which action BEST ensures the hunt contributes to long-term defensive improvement?

Options:

A.

Escalating the incident to executive leadership

B.

Resetting credentials for all affected users

C.

Documenting findings and updating detection logic

D.

Continuing to monitor the activity for additional evidence

Buy Now
Question # 19

A SOC leadership team wants to demonstrate the business value of investing in Cisco-based threat hunting capabilities. Which outcome BEST demonstrates that value?

Options:

A.

Increase in alerts generated by security tools

B.

Reduction in false positives across the SOC

C.

Earlier detection of attacks before data exfiltration

D.

Growth in threat intelligence subscriptions

Buy Now
Question # 20

The CISO must improve the threat-hunting strategy to strengthen the organization's security posture and better prepare against sophisticated threats. Which aspect of the Threat Hunting Maturity Model can significantly enhance an organization's ability to address challenges outlined in the Pyramid of Pain?

Options:

A.

Emphasizing focus on compliance-driven security checks and audits to ensure seamless audit

B.

Conducting threat assessments and wargames quarterly during scheduled security reviews

C.

Transitioning from reactive to proactive threat hunting to identify unknown threats and vulnerabilities

D.

Developing automated processes to systematically detect known threats across the network

Buy Now
Question # 21

Refer to the exhibit.

An analyst is evaluating artifacts and logs collected from recent breach. In the logs, ATP established persistency of malware by placing a path to the executable in a specific registry entry. What is the difference between the ATP's approach and using HKEY LOCAL MACHINE\Software\Microsoft\Windows\CurrentVersion\Run instead?

Options:

A.

The key is available only on older versions of Windows and is not supported in newer ones.

B.

Entries in this key are automatically removed after a system restart, which prevents persistence.

C.

Modifying this key requires administrative privileges, which the malware might not have.

D.

This key is meant for system settings and not for storing startup program entries.

Buy Now
Exam Code: 300-220
Exam Name: Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD
Last Update: Feb 24, 2026
Questions: 60
300-220 pdf

300-220 PDF

$28.5  $94.99
300-220 Engine

300-220 Testing Engine

$33  $109.99
300-220 PDF + Engine

300-220 PDF + Testing Engine

$43.5  $144.99