100+ Free Cisco 300-220 CBRTHD Practice Questions
Pass your Cisco CBRTHD: Conducting Threat Hunting and Defending using Cisco Technologies (300-220) exam on the first try — instant access, no signup required.
Which definition best describes proactive threat hunting compared to traditional reactive incident response?
Key Facts: Cisco 300-220 CBRTHD Exam
~60
Exam Questions
Cisco 300-220 CBRTHD
90 min
Exam Duration
Cisco
~825/1000
Approximate Cut Score
Cisco scaled scoring
$300
Exam Fee
Cisco / Pearson VUE
Professional
Level (CyberOps Concentration)
Cisco CyberOps Professional
3 years
Certification Validity
Cisco recertification cycle
The Cisco 300-220 CBRTHD exam has approximately 60 questions in 90 minutes with a scaled cut score commonly cited around 825/1000. Domains: threat hunting concepts and frameworks (20%), threat modeling techniques (20%), threat actor attribution (15%), threat hunting techniques (25%), threat hunting process (10%), threat hunting outcomes (10%). It is a CyberOps Professional concentration exam — passing it plus 350-201 CBRCOR earns the Cisco CyberOps Professional certification and the Cisco Certified Specialist - Threat Hunting badge. Exam fee is $300 USD at Pearson VUE.
Sample Cisco 300-220 CBRTHD Practice Questions
Try these sample questions to test your Cisco 300-220 CBRTHD exam readiness. Each question includes a detailed explanation. Start the interactive quiz above for the full 100+ question experience with AI tutoring.
1Which definition best describes proactive threat hunting compared to traditional reactive incident response?
2In the OODA loop applied to threat hunting, which step involves comparing current telemetry against the hunter's mental model of the adversary's expected behavior?
3On David Bianco's Pyramid of Pain, which indicator type causes the MOST pain to an adversary when defenders detect and block it?
4Which level of the Hunting Maturity Model (HMM) describes an organization that performs ad-hoc, analyst-driven hunts but lacks routine data collection or repeatable procedures?
5Which framework provides a structured methodology specifically for the threat hunting lifecycle (Trigger, Hypothesis, Investigation, Discovery)?
6Which MITRE ATT&CK matrix component represents the adversary's high-level goal, such as Initial Access or Lateral Movement?
7MITRE ATT&CK Navigator is most commonly used by hunt teams to:
8MITRE D3FEND complements ATT&CK by providing a knowledge graph of:
9What is the PRIMARY difference between an Indicator of Compromise (IOC) and an Indicator of Attack (IOA)?
10A hunt that begins with a specific intel report stating "APT29 is using technique T1059.001 (PowerShell) for initial execution" is BEST classified as which type of hunt?
About the Cisco 300-220 CBRTHD Exam
Cisco 300-220 CBRTHD (Conducting Threat Hunting and Defending using Cisco Technologies) is a CyberOps Professional concentration exam. It validates a hunter's ability to apply threat hunting frameworks (MITRE ATT&CK, D3FEND, TaHiTI, HMM, Pyramid of Pain, Diamond Model, Cyber Kill Chain), interpret threat intelligence (STIX/TAXII, Cisco Talos), use Cisco Secure data sources (Secure Endpoint, Stealthwatch with ETA, Secure Firewall FTD, Umbrella, ESA, WSA, ISE, Duo, Secure Workload), operate hunting tooling (Cisco XDR, SecureX orchestration, Secure Malware Analytics, Splunk Cisco apps, ELK), execute endpoint and network hunts, hand off to NIST IR, and convert findings into durable detections.
Questions
60 scored questions
Time Limit
90 minutes
Passing Score
Variable cut score (~825/1000)
Exam Fee
$300 (Cisco / Pearson VUE)
Cisco 300-220 CBRTHD Exam Content Outline
Threat Hunting Concepts and Frameworks
Proactive vs reactive defense, the hunt loop and OODA, structured/unstructured/situational hunts, Pyramid of Pain (IOC vs IOA), MITRE ATT&CK (tactics/techniques/sub-techniques/procedures), ATT&CK Navigator, MITRE D3FEND, TaHiTI methodology, and the Hunting Maturity Model (HMM)
Threat Modeling Techniques
Diamond Model of Intrusion Analysis (Adversary, Capability, Infrastructure, Victim and pivots), Lockheed Martin Cyber Kill Chain (Recon -> Weaponize -> Deliver -> Exploit -> Install -> C2 -> Actions on Objectives), STIX/TAXII threat intel sharing, and Cisco Talos as the integrated intel feed
Threat Actor Attribution Techniques
APT profiling: targeted sectors and geography, TTPs mapped to ATT&CK, malware families and tooling overlap, infrastructure clustering, attribution caveats and confidence levels
Threat Hunting Techniques (Endpoint, Network, Cisco Data Sources)
Endpoint hunts: process injection (T1055), persistence (registry Run keys, scheduled tasks, WMI), Pass-the-Hash, Golden Ticket, Kerberoasting, DCSync, LOLBins (mshta, certutil, bitsadmin), fileless malware, PowerShell encoded execution, LSASS access (T1003.001). Network hunts: beaconing, DNS tunneling, DGA, fast flux, encrypted C2 fingerprints (JA3/JA3S), data exfiltration, anomalous protocols, and Stealthwatch alarms. Cisco data sources: Secure Endpoint (process/file/network telemetry, Orbital, Trajectory), Secure Network Analytics (Stealthwatch) with NetFlow + ETA, Secure Firewall FTD/FMC, Umbrella DNS + Investigate, Secure Email (ESA), Secure Web (WSA), ISE/TrustSec, Duo, Secure Workload
Threat Hunting Process and Tooling
Hypothesis development, scoping, data collection, investigation pivots, and documentation. Cisco XDR (extended detection and response), SecureX orchestration / XDR Automate, Cisco Threat Intelligence Director (TID) on FMC, Secure Malware Analytics (formerly ThreatGrid), Splunk Cisco Security apps and CIM add-ons, ELK stack
Threat Hunting Outcomes (Detection Engineering, IR, Metrics)
Convert findings into versioned detections (Sigma, EDR, SIEM correlation), purple-team validation (Atomic Red Team, Caldera), NIST IR lifecycle handoff (Preparation -> Detection & Analysis -> Containment, Eradication, Recovery -> Post-Incident), playbooks, tabletops, MTTD/MTTR/dwell time, false positive tuning, and hunt report quality
How to Pass the Cisco 300-220 CBRTHD Exam
What You Need to Know
- Passing score: Variable cut score (~825/1000)
- Exam length: 60 questions
- Time limit: 90 minutes
- Exam fee: $300
Keys to Passing
- Complete 500+ practice questions
- Score 80%+ consistently before scheduling
- Focus on highest-weighted sections
- Use our AI tutor for tough concepts
Cisco 300-220 CBRTHD Study Tips from Top Performers
Frequently Asked Questions
What is the Cisco 300-220 CBRTHD exam?
Cisco 300-220 CBRTHD (Conducting Threat Hunting and Defending using Cisco Technologies) is a CyberOps Professional concentration exam. It validates threat hunting expertise across frameworks (MITRE ATT&CK, D3FEND, TaHiTI, HMM, Pyramid of Pain, Diamond Model, Cyber Kill Chain), Cisco Secure data sources, and the hunt-to-detection lifecycle.
How many questions are on the 300-220 exam?
The Cisco 300-220 CBRTHD exam has approximately 55-65 questions delivered in 90 minutes. Question types include multiple choice (single and multiple response), drag-and-drop, and scenario-based items. Cisco does not publish the exact item count per form.
What is the passing score for Cisco 300-220?
Cisco does not publish an exact passing percentage for 300-220. Cisco professional exams are scored on a 300-1000 scale with the practical cut score commonly reported around 825/1000. Cisco may adjust cut scores between forms based on item difficulty.
How much does the Cisco 300-220 exam cost?
The Cisco 300-220 CBRTHD exam costs $300 USD at Pearson VUE. The exam can be taken at a physical Pearson VUE test center or online via OnVUE proctored delivery. Local pricing and tax may apply.
What certification does 300-220 earn?
Passing 300-220 alone earns the Cisco Certified Specialist - Threat Hunting badge. Combined with 350-201 CBRCOR (the CyberOps Professional core exam), it earns the full Cisco CyberOps Professional certification, valid for 3 years.
How long should I study for Cisco 300-220?
Plan for 80-160 hours of focused study over 2-4 months. Core resources: official Cisco CBRTHD exam topics, the Cisco CBRTHD course (or Cisco U. learning path), MITRE ATT&CK and D3FEND, hands-on labs with Cisco XDR, Secure Endpoint (Orbital), Stealthwatch ETA, Umbrella Investigate, and Secure Firewall FTD/FMC. Aim for 85%+ on full-length mocks before scheduling.