Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Cisco Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD 300-220 Question # 15 Topic 2 Discussion

Cisco Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD 300-220 Question # 15 Topic 2 Discussion

300-220 Exam Topic 2 Question 15 Discussion:
Question #: 15
Topic #: 2

A security operations team is transitioning from alert-driven investigations to a mature threat hunting program. The team wants to focus on detecting adversaries who intentionally evade signature-based tools and traditional SIEM alerts by using legitimate credentials and native system utilities. Which hunting focus best supports this objective?


A.

Tracking known malicious IP addresses and domains from threat intelligence feeds


B.

Monitoring endpoint antivirus alerts for malware detections


C.

Analyzing abnormal behavior patterns across identity, endpoint, and network telemetry


D.

Blocking files with known malicious hashes at the firewall


Get Premium 300-220 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.