Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

300-220 Sample Questions Answers

Questions 4

A threat hunter is performing a structured hunt usingCisco Secure Endpoint (AMP)telemetry to identify credential harvesting activity. Which data source is MOST critical during thedata collection and processing phaseof the hunt?

Options:

A.

File reputation scores from Talos

B.

Endpoint process execution and memory access events

C.

Threat intelligence reports from external vendors

D.

User-reported suspicious activity

Buy Now
Questions 5

A security team is performing threat modeling for a hybrid environment consisting of on-prem Active Directory and Azure AD. The team wants to identify how an attacker could move from a compromised cloud identity to full on-prem domain dominance. Which modeling focus is MOST appropriate?

Options:

A.

Enumerating CVEs affecting domain controllers

B.

Mapping trust relationships between identity systems

C.

Assigning CVSS scores to authentication mechanisms

D.

Conducting packet-level network flow analysis

Buy Now
Questions 6

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

Options:

A.

Immediately begin a new hypothesis

B.

Document findings and operationalize detections

C.

Disable all affected user accounts

D.

Escalate the incident directly to executive leadership

Buy Now
Questions 7

Refer to the exhibit.

An analyst is evaluating artifacts and logs collected from recent breach. In the logs, ATP established persistency of malware by placing a path to the executable in a specific registry entry. What is the difference between the ATP's approach and using HKEY LOCAL MACHINE\Software\Microsoft\Windows\CurrentVersion\Run instead?

Options:

A.

The key is available only on older versions of Windows and is not supported in newer ones.

B.

Entries in this key are automatically removed after a system restart, which prevents persistence.

C.

Modifying this key requires administrative privileges, which the malware might not have.

D.

This key is meant for system settings and not for storing startup program entries.

Buy Now
Questions 8

A threat hunter completes a structured hunt and confirms malicious lateral movement within the environment. Which action BEST ensures the hunt contributes to long-term defensive improvement?

Options:

A.

Escalating the incident to executive leadership

B.

Resetting credentials for all affected users

C.

Documenting findings and updating detection logic

D.

Continuing to monitor the activity for additional evidence

Buy Now
Questions 9

While investigating multiple incidents, analysts notice that attackers consistently use SMB for lateral movement and avoid PowerShell execution. Why is this observation valuable for attribution?

Options:

A.

It identifies the exploit used for initial access

B.

It reveals the attacker’s malware development framework

C.

It highlights consistent attacker tradecraft

D.

It confirms data exfiltration techniques

Buy Now
Questions 10

A SOC manager wants to evaluate whether the organization’s Cisco-based threat hunting program is improving over time. Which metric BEST reflects increased threat hunting effectiveness?

Options:

A.

Number of alerts generated by Cisco security tools

B.

Reduction in attacker dwell time

C.

Number of blocked IP addresses

D.

Volume of threat intelligence feeds consumed

Buy Now
Questions 11

A SOC team using Cisco security technologies wants to improve its ability to detect threats that bypass traditional security controls by abusing valid user credentials. Which hunting focus MOST effectively addresses this challenge?

Options:

A.

Monitoring antivirus alerts for malware detections

B.

Tracking file hash reputation from threat intelligence feeds

C.

Analyzing authentication behavior anomalies across users and devices

D.

Blocking newly registered domains at the firewall

Buy Now
Questions 12

During an investigation, analysts observe that attackers consistently avoid PowerShell logging, disable AMSI, and prefer WMI for execution. Why is this information critical for attribution?

Options:

A.

It identifies the malware family used

B.

It reveals the attacker’s IP infrastructure

C.

It reflects the attacker’s operational preferences

D.

It confirms the exploit used for initial access

Buy Now
Questions 13

A SOC team wants to detect lateral movement performed using legitimate administrative tools rather than malware. Which telemetry source provides the MOST reliable visibility for this hunting objective?

Options:

A.

Antivirus detection logs

B.

Email security gateway logs

C.

Authentication and remote execution logs

D.

Web proxy URL filtering logs

Buy Now
Questions 14

What triggers unstructured threat hunting?

Options:

A.

Indicators of compromise

B.

Tactics, techniques, and procedures

C.

Customized threat identification

D.

Indicators of attack

Buy Now
Questions 15

Refer to the exhibit.

A forensic team must investigate how the company website was defaced. The team isolates the web server, clones the disk, and analyzes the logs. Which technique was used by the attacker initially to access the website?

Options:

A.

exploit public-facing application

B.

external remote services

C.

command and scripting interpreter

D.

drive-by compromise

Buy Now
Questions 16

During multiple investigations using Cisco telemetry, analysts observe attackers consistently perform internal discovery before privilege escalation and avoid high-risk actions. Why is this observation useful for attribution?

Options:

A.

It confirms the attacker used a known exploit

B.

It reveals the attacker’s malware development skills

C.

It indicates disciplined and methodical tradecraft

D.

It identifies the attacker’s command-and-control server

Buy Now
Questions 17

A threat hunter usesCisco Secure Endpointto investigate a suspected credential-harvesting attack that does not involve dropping files to disk. Which capability is MOST critical for detecting this activity?

Options:

A.

File hash reputation scoring

B.

Endpoint process ancestry tracking

C.

Email attachment sandboxing

D.

URL category filtering

Buy Now
Questions 18

A threat hunter usesCisco Secure Network Analytics (Stealthwatch)to identify potential command-and-control traffic. Which characteristic MOST strongly indicates beaconing behavior?

Options:

A.

Large file transfers to external IP addresses

B.

Irregular outbound connections over multiple protocols

C.

Small, periodic outbound connections to a rare destination

D.

High-volume inbound traffic from the internet

Buy Now
Exam Code: 300-220
Exam Name: Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD
Last Update: Feb 2, 2026
Questions: 60
$70  $174.99
$54  $134.99
$46  $114.99
buy now 300-220