Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Cisco Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD 300-220 Question # 4 Topic 1 Discussion

Cisco Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD 300-220 Question # 4 Topic 1 Discussion

300-220 Exam Topic 1 Question 4 Discussion:
Question #: 4
Topic #: 1

A threat hunter usesCisco Secure Network Analytics (Stealthwatch)to identify potential command-and-control traffic. Which characteristic MOST strongly indicates beaconing behavior?


A.

Large file transfers to external IP addresses


B.

Irregular outbound connections over multiple protocols


C.

Small, periodic outbound connections to a rare destination


D.

High-volume inbound traffic from the internet


Get Premium 300-220 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.