Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A threat hunter completes a structured hunt and confirms malicious lateral movement within the environment. Which action BEST ensures the hunt contributes to long-term defensive improvement?

A.

Escalating the incident to executive leadership

B.

Resetting credentials for all affected users

C.

Documenting findings and updating detection logic

D.

Continuing to monitor the activity for additional evidence

A security team wants to create a plan to protect companies from lateral movement attacks. The team already implemented detection alerts for pass-the-hash and pass-the-ticket techniques. Which two components must be monitored to hunt for lateral movement attacks on endpoints? (Choose two.)

A.

Use of the runas command

B.

Linux file systems for files that have the setuid/setgid bit set

C.

Use of Windows Remote Management

D.

Creation of scheduled task events

E.

Use of tools and commands to connect to remote shares

A SOC repeatedly discovers similar attacker behaviors during separate hunts, indicating recurring detection gaps. What process change MOST effectively prevents rediscovery of the same threats?

A.

Increasing analyst staffing

B.

Automating hunt execution

C.

Converting hunt findings into permanent detections

D.

Conducting more frequent unstructured hunts

What triggers unstructured threat hunting?

A.

Indicators of compromise

B.

Tactics, techniques, and procedures

C.

Customized threat identification

D.

Indicators of attack

Refer to the exhibit. A cybersecurity team receives an alert from its Intrusion Prevention System about multiple file changes to a file server. Before the changes were made, the team detected a successful remote sign-in from a user account to the server. Which type of threat occurred?

A.

white box penetration test

B.

authorized penetration test

C.

unauthorized penetration test

D.

black box penetration test

A SOC team must prepare for a new phishing campaign that tricks users into clicking a malicious URL to download a file. When the file executes, it creates a Windows process that harvests user credentials. The team must configure the SIEM tool to receive an alert if a suspicious process is detected. Which two rules must the team create in the SIEM tool? (Choose two.)

A.

Rule that detects processes created by the users

B.

Rule that detects processes in nonstandard file paths

C.

Rule that detects common processes that have modified names

D.

Rule that detects changes in process ownership

E.

Rule that detects changes in process startup time

A threat hunter wants to detect fileless malware activity usingCisco Secure Endpoint. Which behavior would MOST strongly indicate fileless execution?

A.

Executables running from Program Files

B.

Processes spawning from user-writable directories

C.

Legitimate system processes executing encoded commands

D.

Files with unknown hash reputation

During multiple investigations using Cisco telemetry, analysts observe attackers consistently perform internal discovery before privilege escalation and avoid high-risk actions. Why is this observation useful for attribution?

A.

It confirms the attacker used a known exploit

B.

It reveals the attacker’s malware development skills

C.

It indicates disciplined and methodical tradecraft

D.

It identifies the attacker’s command-and-control server