Cisco 300-220 Practice Exams
Last updated on Apr 01,2025- Exam Code: 300-220
- Exam Name: Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps
- Certification Provider: Cisco
- Latest update: Apr 01,2025
Which of the following is a common method for detecting phishing attacks in threat hunting techniques?
- A . DNS monitoring
- B . Predictive analytics
- C . Asset management
- D . Hardware encryption
What is the first step in the Threat Hunting process?
- A . Identifying potential threats
- B . Collecting data
- C . Defining assumptions
- D . Analyzing the data
In relation to threat hunting, what does the acronym IOC stand for?
- A . Independent Observation Criteria
- B . Indicators of Compromise
- C . Internal Operations Center
- D . Incident Of Concern
Which threat modeling technique involves identifying security controls and countermeasures to mitigate threats?
- A . Data flow diagrams
- B . Threat modeling matrix
- C . SWOT analysis
- D . STRIDE model
What is the first step in the threat hunting process according to common methodologies?
- A . Threat modeling
- B . Threat actor attribution
- C . Hypothesis generation
- D . Data collection
In threat hunting outcomes, what is the value of documenting findings and lessons learned?
- A . It is unnecessary
- B . It helps in identifying trends and patterns
- C . It slows down the investigation process
- D . It is only useful for external reporting purposes
Which technique involves manually reviewing log files and analyzing them for signs of malicious activity?
- A . Network traffic analysis
- B . Signature-based detection
- C . Log file analysis
- D . Incident response
Which of the following is a method used in threat actor attribution?
- A . Packet sniffing
- B . Social engineering
- C . Geolocation tracking
- D . Behavioral analysis
Which of the following is an example of an active threat hunting technique?
- A . Conducting regular vulnerability scans
- B . Reviewing security logs after an incident
- C . Monitoring network traffic in real-time
- D . Waiting for alerts from automated security tools
Indicators of compromise (IOCs) are used in which threat hunting technique?
- A . Network traffic analysis
- B . Threat actor attribution
- C . Threat modeling
- D . Data exfiltration detection