Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Security > 300-745

300-745 Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 Question and Answers

Question # 4

A financial company is focused on proactively protecting sensitive data stored on the devices. The company recognizes the potential risks associated with lost or stolen devices and they want a solution to ensure that if unauthorized user access the device, the data it contains is not accessible or misused. The solution includes implementing a strategy that renders data unreadable without user authentication. Which solution meets the requirement?

A.

Install Kensington Lock.

B.

Use a BIOS password.

C.

Implement data encryption on disk.

D.

Apply GPS tracking.

Full Access
Question # 5

How does a SOC leverage flow collectors?

A.

It performs data backup and recovery.

B.

It performs load balancing capabilities across systems to optimize performance.

C.

It provides data for analysis in threat detection and response system.

D.

It provides real-time content filtering.

Full Access
Question # 6

How is generative AI used in securing networks?

A.

to provide real-time load balancing

B.

to improve resource consumption

C.

to perform real-time audits to ensure regulatory compliance

D.

to detect unusual patterns in network traffic

Full Access
Question # 7

Which generative AI impact is addressed by a human-in-the-loop design policy?

A.

AI hallucinations

B.

deep fakes

C.

phishing

D.

scale changes

Full Access
Question # 8

Which benefit does AI provide in network security?

A.

It speeds up network data transmission rates.

B.

It replaces comprehensive defense in depth.

C.

It provides complete protection from DDoS attacks.

D.

It identifies vulnerabilities associated with weak TLS algorithms.

Full Access
Question # 9

A legal services company wants to prevent remote employees from accessing personal email and social media accounts while using corporate laptops. Which security solution enforces the policy?

A.

Cisco TrustSec

B.

RADIUS server

C.

Cisco Umbrella

D.

network monitoring tool

Full Access
Question # 10

An employee of a pharmaceutical company accidentally checked in code that contains AWS secret keys to a public GitHub repository, which exposes production resources to attackers. Which mitigation strategy must a security engineer recommend to prevent future reoccurrence?

A.

Add a web application firewall.

B.

Implement a more granular port security strategy.

C.

Implement a phishing education campaign.

D.

Configure a SCM precommit hook.

Full Access
Question # 11

After deploying a new API, the security team must identify the components of the application that are exposed to the internet and whether there are application authentication risks. Which technology must be deployed to discover the applications services and monitor for authentication issues?

A.

Cloud Security Posture Management

B.

API trace analysis

C.

secret scanning

D.

Cloud Workload Protection

Full Access
Question # 12

A company recently discovered that a former employee, who left to join a competitor, continued to access and exfiltrate sensitive data over several weeks after leaving. The breach highlighted vulnerabilities in the organization’s data security and access management practices. To prevent such incidents in the future, the organization must adopt measures that detect and restrict unauthorized data access and transfer. Which mitigation strategy must be implemented to address the issue?

A.

Implement web application firewall.

B.

Upgrade network policy access.

C.

Implement data loss prevention strategy.

D.

Deploy audit logging and monitoring solution.

Full Access
Question # 13

An IT company operates an application in a SaaS model. The administrative tasks, such as customer onboarding, within the application must be restricted to users who are on the corporate network where admins can access those functions via a web browser or a smartphone application. Which application technology must be used to provide granular control based on function?

A.

VPC

B.

RBAC

C.

security group

D.

Service Mesh

Full Access
Question # 14

Network administrators at a medical facility cannot log in to network devices because of excessive resource consumption and high CPU utilization. The situation has led to delays in routine maintenance and troubleshooting, which affects overall network performance. An engineer must optimize the handling of traffic to reduce the impact and maintain consistent access and operational efficiency. Which approach must be implemented to meet the requirement?

A.

Control Plane Policing

B.

AAA

C.

SNMP

D.

RBAC

Full Access
Question # 15

A technology company recently onboarded a new customer in the medical space. The customer needs a solution to provide data integrity across remote sites. Which solution must be used to meet this requirement?

A.

hashing

B.

data masking

C.

preshared key

D.

authentication

Full Access
Question # 16

The network security team of a private university is conducting a comprehensive audit to evaluate the security posture across the network infrastructure. During the review, the security team found that a trusted vendor disclosed serious vulnerabilities identified in a product that plays a crucial role in the university’s CI/CD pipeline. The security team must act promptly to mitigate the potential risks posed by these vulnerabilities. Which action must the security team take first in response to the disclosure?

A.

Leverage IDS to measure the impact of the vulnerability.

B.

Notify customers of the impact and its source.

C.

Confirm impact by validating presence of the product in company’s environment.

D.

Patch the impacted product as soon as possible.

Full Access
Question # 17

An IT company experienced the spread of malicious content between user endpoints, which impacted business critical resources. The company wants to implement a solution to control communication between individual endpoints on the network. Which approach achieves the goal?

A.

RADIUS

B.

TrustSec

C.

posture

D.

profiling

Full Access