Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A Cisco-focused SOC wants to move detection coverage higher on thePyramid of Pain. Which hunting outcome BEST supports this objective?

A.

Blocking known malicious domains using Cisco Secure Web Appliance

B.

Detecting abnormal authentication behavior across VPN and cloud access

C.

Creating alerts for malware hashes from Talos feeds

D.

Quarantining infected endpoints automatically

A SOC analyst using Cisco security tools wants to differentiatethreat huntingfromtraditional detection engineering. Which activity BEST represents threat hunting rather than detection engineering?

A.

Creating a SIEM rule to alert on known malicious domains

B.

Tuning EDR alerts to reduce false positives

C.

Formulating a hypothesis to search for credential misuse without alerts

D.

Blocking IP addresses based on Talos intelligence

The security team detects an alert regarding a potentially malicious file namedFinancial_Data_526280622.pdfdownloaded by a user. Upon reviewing SIEM logs and Cisco Secure Endpoint, the team confirms that the file was obtained from an untrusted website. The hash analysis of the file returns an unknown status. Which action must be done next?

A.

Submit the file for sandboxing.

B.

Review the directory path where the file is stored.

C.

Run a complete malware scan on the user's workstation.

D.

Investigate the reputation of the untrusted website.

A SOC leadership team wants to demonstrate the business value of investing in Cisco-based threat hunting capabilities. Which outcome BEST demonstrates that value?

A.

Increase in alerts generated by security tools

B.

Reduction in false positives across the SOC

C.

Earlier detection of attacks before data exfiltration

D.

Growth in threat intelligence subscriptions

A threat hunter is performing a structured hunt usingCisco Secure Endpoint (AMP)telemetry to identify credential harvesting activity. Which data source is MOST critical during thedata collection and processing phaseof the hunt?

A.

File reputation scores from Talos

B.

Endpoint process execution and memory access events

C.

Threat intelligence reports from external vendors

D.

User-reported suspicious activity

During a structured hunt, analysts using Cisco SIEM tools complete hypothesis testing and confirm malicious activity. What is the NEXT step in the Cisco threat hunting lifecycle?

A.

Immediately begin a new hypothesis

B.

Document findings and operationalize detections

C.

Disable all affected user accounts

D.

Escalate the incident directly to executive leadership

Refer to the exhibit. Which technique is used by the attacker?

A.

Perform a preliminary check to verify if the victim has already been compromised.

B.

Scan using a batch file created on the fly that contains the command.

C.

Use a base64-encoded VBScript that is decoded and executed on the endpoint.

D.

Set up persistence by creating a shortcut for the malicious macro in the user's Startup directory

A security analyst receives an alert that host A, which has an IP address of 192.168.5.39, has a new browser extension installed. During an investigation of the SIEM tool logs, the analyst discovers that host A made continuous TCP connections to an IP address of 1.25.241.8 via TCP port 80. The 1.25.241.8 IP address is categorized as a C2 server. Which action should the analyst take to mitigate similar connections in the future?

A.

Configure a browser extension deny list.

B.

Use antivirus software to quarantine suspicious files automatically.

C.

Use Deep Packet Inspection to block malicious domains.

D.

Use IDS to detect and avoid similar connections.

A threat hunter usesCisco Secure Endpointto investigate a suspected credential-harvesting attack that does not involve dropping files to disk. Which capability is MOST critical for detecting this activity?

A.

File hash reputation scoring

B.

Endpoint process ancestry tracking

C.

Email attachment sandboxing

D.

URL category filtering

A threat hunting team is attempting to attribute a series of intrusions across multiple organizations to a known threat actor. The malware binaries differ across incidents, infrastructure changes frequently, and IP addresses rotate daily. Which evidence provides the STRONGEST basis for confident attribution?

A.

Overlapping IP address ranges used during attacks

B.

Similar malware filenames and hashes

C.

Consistent attacker tradecraft mapped to MITRE ATT&CK

D.

Identical timestamps of attack activity