Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Cisco Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD 300-220 Question # 18 Topic 2 Discussion

Cisco Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD 300-220 Question # 18 Topic 2 Discussion

300-220 Exam Topic 2 Question 18 Discussion:
Question #: 18
Topic #: 2

A SOC analyst is usingCisco Secure Network Analytics (Stealthwatch)to hunt for command-and-control (C2) activity across the enterprise. The analyst wants to identify stealthy C2 channels that intentionally avoid known malicious IP addresses and domains. Which Stealthwatch hunting approach BEST supports this objective?


A.

Blocking outbound traffic to known C2 IP addresses


B.

Monitoring NetFlow records for abnormal beaconing patterns


C.

Reviewing firewall deny logs for suspicious connections


D.

Relying on threat intelligence feeds for C2 indicators


Get Premium 300-220 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.