Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Cisco Cisco Certified Specialist - Threat Hunting and Defending 300-220 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

The CISO must improve the threat-hunting strategy to strengthen the organization's security posture and better prepare against sophisticated threats. Which aspect of the Threat Hunting Maturity Model can significantly enhance an organization's ability to address challenges outlined in the Pyramid of Pain?

Options:

A.

Emphasizing focus on compliance-driven security checks and audits to ensure seamless audit


B.

Conducting threat assessments and wargames quarterly during scheduled security reviews


C.

Transitioning from reactive to proactive threat hunting to identify unknown threats and vulnerabilities


D.

Developing automated processes to systematically detect known threats across the network


Expert Solution
Questions # 2:

The security team detects an alert regarding a potentially malicious file namedFinancial_Data_526280622.pdfdownloaded by a user. Upon reviewing SIEM logs and Cisco Secure Endpoint, the team confirms that the file was obtained from an untrusted website. The hash analysis of the file returns an unknown status. Which action must be done next?

Options:

A.

Submit the file for sandboxing.


B.

Review the directory path where the file is stored.


C.

Run a complete malware scan on the user's workstation.


D.

Investigate the reputation of the untrusted website.


Expert Solution
Questions # 3:

A threat hunter wants to detect fileless malware activity usingCisco Secure Endpoint. Which behavior would MOST strongly indicate fileless execution?

Options:

A.

Executables running from Program Files


B.

Processes spawning from user-writable directories


C.

Legitimate system processes executing encoded commands


D.

Files with unknown hash reputation


Expert Solution
Questions # 4:

A threat hunter usesCisco Secure Network Analytics (Stealthwatch)to identify potential command-and-control traffic. Which characteristic MOST strongly indicates beaconing behavior?

Options:

A.

Large file transfers to external IP addresses


B.

Irregular outbound connections over multiple protocols


C.

Small, periodic outbound connections to a rare destination


D.

High-volume inbound traffic from the internet


Expert Solution
Questions # 5:

A Cisco-focused SOC wants to move detection coverage higher on thePyramid of Pain. Which hunting outcome BEST supports this objective?

Options:

A.

Blocking known malicious domains using Cisco Secure Web Appliance


B.

Detecting abnormal authentication behavior across VPN and cloud access


C.

Creating alerts for malware hashes from Talos feeds


D.

Quarantining infected endpoints automatically


Expert Solution
Questions # 6:

A SOC team must prepare for a new phishing campaign that tricks users into clicking a malicious URL to download a file. When the file executes, it creates a Windows process that harvests user credentials. The team must configure the SIEM tool to receive an alert if a suspicious process is detected. Which two rules must the team create in the SIEM tool? (Choose two.)

Options:

A.

Rule that detects processes created by the users


B.

Rule that detects processes in nonstandard file paths


C.

Rule that detects common processes that have modified names


D.

Rule that detects changes in process ownership


E.

Rule that detects changes in process startup time


Expert Solution
Questions # 7:

A SOC analyst using Cisco security tools wants to differentiatethreat huntingfromtraditional detection engineering. Which activity BEST represents threat hunting rather than detection engineering?

Options:

A.

Creating a SIEM rule to alert on known malicious domains


B.

Tuning EDR alerts to reduce false positives


C.

Formulating a hypothesis to search for credential misuse without alerts


D.

Blocking IP addresses based on Talos intelligence


Expert Solution
Questions # 8:

The Security Operations Center team at a company detects a successful VPN connection from a country outside the known countries of operation. After the connection occurs, the team receives multiple triggers from the same source IP address about file access and modifications to the file server. The team concludes that this is a case of data exfiltration from an unknown adversary through a compromised user account. To find other potential actions taken by the adversary, which type of threat hunting should be used?

Options:

A.

Unstructured


B.

AI-driven


C.

Proactive


D.

Structured


Expert Solution
Questions # 9:

Refer to the exhibit.

Question # 9

A security engineer notices that a Windows Batch script includes calls to suspicious APIs. How will the script affect the system when it is executed?

Options:

A.

The internet connection is disabled.


B.

The host version is retrieved.


C.

The host is put in sleep mode.


D.

Files are encrypted.


Expert Solution
Questions # 10:

A SOC using Cisco security technologies wants to measure the success of its threat hunting program over time. Which metric BEST reflects increased threat hunting maturity?

Options:

A.

Number of alerts generated per day


B.

Volume of threat intelligence feeds ingested


C.

Reduction in attacker dwell time


D.

Number of blocked IP addresses


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions