Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 300-220 Practice Exam with Questions & Answers

Questions 1

The SOC team receives an alert about a user sign-in from an unusual country. After investigating the SIEM logs, the team confirms the user never signed in from that country. The incident is reported to the IT administrator who resets the user's password. Which threat hunting phase was initially used?

Options:
A.

Collect and process intelligence and data

B.

Response and resolution

C.

Hypothesis

D.

Post-incident review

Cisco 300-220 Premium Access
Questions 2

During multiple intrusions, analysts observe that attackers consistently perform internal reconnaissance before privilege escalation, avoid noisy exploitation, and limit actions to business hours of the victim’s region. Why is this observation important for attribution?

Options:
A.

It confirms the use of a specific exploit kit

B.

It indicates an advanced persistence mechanism

C.

It reveals operational discipline and intent

D.

It identifies the malware command-and-control protocol

Questions 3

Refer to the exhibit.

300-220 Question 3

A threat-hunting team makes an EDR query to detect possible C2 outbound communication across all endpoints. Which level of the Pyramid of Pain is being used?

Options:
A.

Tough

B.

Challenging

C.

Easy

D.

Simple

Questions 4

A SOC using Cisco security technologies wants to measure the success of its threat hunting program over time. Which metric BEST reflects increased threat hunting maturity?

Options:
A.

Number of alerts generated per day

B.

Volume of threat intelligence feeds ingested

C.

Reduction in attacker dwell time

D.

Number of blocked IP addresses

Questions 5

After completing a threat hunt that uncovered previously undetected credential abuse, the SOC wants to ensure long-term improvement in detection and response capabilities. Which action BEST represents the final and most critical phase of the threat hunting lifecycle?

Options:
A.

Immediately blocking all related IP addresses

B.

Documenting findings and updating detection logic

C.

Resetting affected user credentials

D.

Conducting additional unstructured hunts

Questions 6

A threat hunter wants to detect fileless malware activity usingCisco Secure Endpoint. Which behavior would MOST strongly indicate fileless execution?

Options:
A.

Executables running from Program Files

B.

Processes spawning from user-writable directories

C.

Legitimate system processes executing encoded commands

D.

Files with unknown hash reputation

Questions 7

While analyzing telemetry from Cisco Secure Endpoint and Secure Network Analytics, analysts observe that an adversary consistently avoids deploying malware and instead abuses built-in administrative tools. Why does this observation matter for attribution?

Options:
A.

It identifies the specific exploit used

B.

It indicates the attacker is using outdated tools

C.

It reveals consistent attacker tradecraft across incidents

D.

It confirms the presence of ransomware

Questions 8

What is the classification of the pass-the-hash technique according to the MITRE ATT&CK framework?

Options:
A.

Lateral movement

B.

Persistence

C.

Credential access

D.

Privilege escalation

Questions 9

A structured threat hunt using Cisco Secure Network Analytics confirms abnormal internal SMB traffic consistent with lateral movement. Which action should occur NEXT to improve organizational security posture?

Options:
A.

Isolate the affected hosts immediately

B.

Reset all user credentials involved

C.

Document findings and create permanent detections

D.

Continue monitoring until more evidence is collected

Questions 10

A threat hunter is performing a structured hunt usingCisco Secure Endpoint (AMP)telemetry to identify credential harvesting activity. Which data source is MOST critical during thedata collection and processing phaseof the hunt?

Options:
A.

File reputation scores from Talos

B.

Endpoint process execution and memory access events

C.

Threat intelligence reports from external vendors

D.

User-reported suspicious activity

Exam Code: 300-220
Certification Provider: Cisco
Exam Name: Conducting Threat Hunting and Defending using Cisco Technologies for Cybersecurity 300-220 CBRTHD
Last Update: Feb 21, 2026
Questions: 60
PDF + Testing Engine
$174.99
$52.5
Testing Engine
$134.99
$40.5
PDF (Q&A)
$114.99
$34.5