Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Cisco CCNP Security 300-745 Questions and answers with Dumpstech

Exam 300-745 Premium Access

View all detail and faqs for the 300-745 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

After deploying a new API, the security team must identify the components of the application that are exposed to the internet and whether there are application authentication risks. Which technology must be deployed to discover the applications services and monitor for authentication issues?

Options:

A.

Cloud Security Posture Management

B.

API trace analysis

C.

secret scanning

D.

Cloud Workload Protection

Questions # 2:

Which tool is used to collect, analyze, and visualize logs from network devices, endpoints, and other sources in an enterprise?

Options:

A.

Cisco Email Security Appliance

B.

Cloud Observability

C.

Cisco Web Security Appliance

D.

Splunk

Questions # 3:

Which financial reporting regulatory framework must a publicly traded company doing business in the US comply with?

Options:

A.

HIPAA

B.

SOX

C.

SOC

D.

FEDRAMP

Questions # 4:

Considering recent cybersecurity threats, a company wants to improve the process for identifying, assessing, and managing risks with a comprehensive and holistic approach. Which framework must be used to meet these requirements?

Options:

A.

HIPPA

B.

MITRE CAPEC

C.

NIST SP 800-37

D.

GDPR

Questions # 5:

A global hotel chain is using Cisco ISE and Cisco switches to manage the network. The hotel company wants to enhance network security by segmenting users and endpoints. The company must ensure that devices within the same VLAN cannot communicate with each other. The goal is to prevent cross-communication without the use of dynamic access control lists. Which action must be taken using Cisco ISE to meet the requirement?

Options:

A.

Implement device posturing.

B.

Set up endpoint profiling.

C.

Enable identity groups.

D.

Configure TrustSec.

Questions # 6:

Employees in a healthcare organization could not access their devices when they returned to work after the weekend. The security team discovered that a threat actor had encrypted the devices. Which security solution would mitigate the risk in future?

Options:

A.

password policy enforcement

B.

network configuration management

C.

data loss prevention

D.

endpoint detection and response

Questions # 7:

A restaurant distribution center recently suffered a password spray attack targeting the Cisco Secure Firepower Threat Defense VPN headend. The attack attempts to gain unauthorized access by trying common passwords across many accounts. The attack poses a significant security threat to the organization’s remote access infrastructure. To enhance the security of the VPN setup and minimize the risk of similar attacks in the future, the IT security team must implement effective mitigation measures. Which technique effectively reduces the risk of this type of attack?

Options:

A.

Implement an access list to block addresses from the previous password spray attack.

B.

Disable group aliases in the connection profiles.

C.

Change the AAA authentication method from RADIUS to TACACS+.

D.

Enable AAA authentication for the DefaultWEBVPN and DefaultRAGroup Connection Profiles.

Questions # 8:

A technology company has many remote workers who access corporate resources from various locations. The company must ensure that security policies are managed and enforced directly on endpoints, and endpoints are protected from threats regardless of location. Which firewall architecture meets the requirements?

Options:

A.

next-generation firewall

B.

host-based firewall

C.

web application firewall

D.

traditional firewall

Questions # 9:

A financial company uses a remote access solution that directs all traffic over a secure tunnel. The company recently received some large ISP bills from the headquarter location. According to traffic analysis during the investigation, most of the network traffic was due to employees spending a lot of time on video conferences provided by a SaaS collaboration company. What must the company modify to reduce the cost without negatively impacting security or employee experience?

Options:

A.

Reduce the video resolution size permitted within the SaaS application.

B.

Split-exclude the video SaaS application from the VPN.

C.

Block the video conferencing app when connected on VPN.

D.

Suggest users to disconnect from the VPN when on video calls.

Questions # 10:

A company published software that had a security vulnerability, and an attacker used the vulnerability to steal critical information from the environment. The issue was reported by the security team, and the administrator was instructed to run shift-left security tests before publishing the software. Which component of the software development pipeline must be recommended to run the tests?

Options:

A.

continuous deployment

B.

cloud security posture management

C.

software bill of material analysis

D.

source code management

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions