Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the Cisco Cisco Certified Specialist - Threat Hunting and Defending 300-220 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

A threat hunter is asked to model how an attacker could abuse cloud identity misconfigurations to escalate privileges without exploiting software vulnerabilities. Which modeling approach BEST supports this analysis?

Options:

A.

STRIDE focused on spoofing and elevation of privilege


B.

Kill Chain analysis focused on malware execution


C.

Attack path analysis using identity relationships


D.

CVSS scoring of IAM misconfigurations


Expert Solution
Questions # 12:

The SOC team receives an alert about a user sign-in from an unusual country. After investigating the SIEM logs, the team confirms the user never signed in from that country. The incident is reported to the IT administrator who resets the user's password. Which threat hunting phase was initially used?

Options:

A.

Collect and process intelligence and data


B.

Response and resolution


C.

Hypothesis


D.

Post-incident review


Expert Solution
Questions # 13:

A security analyst receives an alert that host A, which has an IP address of 192.168.5.39, has a new browser extension installed. During an investigation of the SIEM tool logs, the analyst discovers that host A made continuous TCP connections to an IP address of 1.25.241.8 via TCP port 80. The 1.25.241.8 IP address is categorized as a C2 server. Which action should the analyst take to mitigate similar connections in the future?

Options:

A.

Configure a browser extension deny list.


B.

Use antivirus software to quarantine suspicious files automatically.


C.

Use Deep Packet Inspection to block malicious domains.


D.

Use IDS to detect and avoid similar connections.


Expert Solution
Questions # 14:

After completing a threat hunt that uncovered previously undetected credential abuse, the SOC wants to ensure long-term improvement in detection and response capabilities. Which action BEST represents the final and most critical phase of the threat hunting lifecycle?

Options:

A.

Immediately blocking all related IP addresses


B.

Documenting findings and updating detection logic


C.

Resetting affected user credentials


D.

Conducting additional unstructured hunts


Expert Solution
Questions # 15:

A security operations team is transitioning from alert-driven investigations to a mature threat hunting program. The team wants to focus on detecting adversaries who intentionally evade signature-based tools and traditional SIEM alerts by using legitimate credentials and native system utilities. Which hunting focus best supports this objective?

Options:

A.

Tracking known malicious IP addresses and domains from threat intelligence feeds


B.

Monitoring endpoint antivirus alerts for malware detections


C.

Analyzing abnormal behavior patterns across identity, endpoint, and network telemetry


D.

Blocking files with known malicious hashes at the firewall


Expert Solution
Questions # 16:

A SOC repeatedly discovers similar attacker behaviors during separate hunts, indicating recurring detection gaps. What process change MOST effectively prevents rediscovery of the same threats?

Options:

A.

Increasing analyst staffing


B.

Automating hunt execution


C.

Converting hunt findings into permanent detections


D.

Conducting more frequent unstructured hunts


Expert Solution
Questions # 17:

Refer to the exhibit.

Question # 17

The cybersecurity team at a company detects an ongoing attack directed at the web server that hosts the company website. The team analyzes the logs of the web application firewall and discovers several HTTP requests encoded in Base64. The team decodes the payloads and retrieves the HTTP requests. What did the attackers use to exploit the server?

Options:

A.

Unicode encoding


B.

SQL injection


C.

directory traversal


D.

cross-site scripting (XSS)


Expert Solution
Questions # 18:

A SOC analyst is usingCisco Secure Network Analytics (Stealthwatch)to hunt for command-and-control (C2) activity across the enterprise. The analyst wants to identify stealthy C2 channels that intentionally avoid known malicious IP addresses and domains. Which Stealthwatch hunting approach BEST supports this objective?

Options:

A.

Blocking outbound traffic to known C2 IP addresses


B.

Monitoring NetFlow records for abnormal beaconing patterns


C.

Reviewing firewall deny logs for suspicious connections


D.

Relying on threat intelligence feeds for C2 indicators


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions