Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Cisco Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD 300-220 Question # 13 Topic 2 Discussion

Cisco Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD 300-220 Question # 13 Topic 2 Discussion

300-220 Exam Topic 2 Question 13 Discussion:
Question #: 13
Topic #: 2

A security analyst receives an alert that host A, which has an IP address of 192.168.5.39, has a new browser extension installed. During an investigation of the SIEM tool logs, the analyst discovers that host A made continuous TCP connections to an IP address of 1.25.241.8 via TCP port 80. The 1.25.241.8 IP address is categorized as a C2 server. Which action should the analyst take to mitigate similar connections in the future?


A.

Configure a browser extension deny list.


B.

Use antivirus software to quarantine suspicious files automatically.


C.

Use Deep Packet Inspection to block malicious domains.


D.

Use IDS to detect and avoid similar connections.


Get Premium 300-220 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.