Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

300-745 Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 is now Stable and With Pass Result | Test Your Knowledge for Free

300-745 Practice Questions

Designing Cisco Security Infrastructure (300-745 SDSI) v1.0

Last Update 4 days ago
Total Questions : 57

Dive into our fully updated and stable 300-745 practice test platform, featuring all the latest CCNP Security exam questions added this week. Our preparation tool is more than just a Cisco study aid; it's a strategic advantage.

Our free CCNP Security practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 300-745. Use this test to pinpoint which areas you need to focus your study on.

300-745 PDF

300-745 PDF (Printable)
$48.3
$137.99

300-745 Testing Engine

300-745 PDF (Printable)
$52.5
$149.99

300-745 PDF + Testing Engine

300-745 PDF (Printable)
$65.45
$186.99
Question # 1

Which design policy addresses harmful content creation by generative AI?

Options:

A.  

quantum resistant encryption

B.  

watermarking

C.  

retrieval augmented generation

D.  

human in the loop

Discussion 0
Question # 2

An employee of a pharmaceutical company accidentally checked in code that contains AWS secret keys to a public GitHub repository, which exposes production resources to attackers. Which mitigation strategy must a security engineer recommend to prevent future reoccurrence?

Options:

A.  

Add a web application firewall.

B.  

Implement a more granular port security strategy.

C.  

Implement a phishing education campaign.

D.  

Configure a SCM precommit hook.

Discussion 0
Question # 3

Employees in a healthcare organization could not access their devices when they returned to work after the weekend. The security team discovered that a threat actor had encrypted the devices. Which security solution would mitigate the risk in future?

Options:

A.  

password policy enforcement

B.  

network configuration management

C.  

data loss prevention

D.  

endpoint detection and response

Discussion 0
Question # 4

After a recent security breach, a financial company is reassessing their overall security posture and strategy to better protect sensitive data and resources. The company already deployed on-premises next-generation firewalls at the network edge for each branch location. Security measures must be enhanced at the endpoint level. The goal is to implement a solution that provides additional traffic filtering directly on endpoint devices, thereby offering another layer of defense against potential threats. Which technology must be implemented to meet the requirement?

Options:

A.  

host-based firewall

B.  

web application firewall

C.  

distributed firewall

D.  

traditional firewall

Discussion 0
Question # 5

Refer to the exhibit.

Question # 5

A retail company recently deployed a file inspection feature using secure endpoint. The file inspection must detect and prevent the execution of malicious files on machines. During testing, logs showed that certain malicious files are still being executed despite the presence of the security measure. To understand why the threats are not being blocked, it is essential to investigate the configuration of secure endpoint policies. Which configuration is allowing the files to execute?

Options:

A.  

Files are not malicious.

B.  

Policy must block the network connections.

C.  

Policy rule is disabled.

D.  

Policy rule is in audit mode.

Discussion 0
Question # 6

A furniture company recently discovered that the endpoint detection and response configuration flagged several malicious files on company-managed laptops. The company must enhance security to prevent known malicious files from being delivered to the network and endpoints. The new solution must enhance the company’s ability to inspect and filter incoming traffic effectively. Which security product must be used to accomplish this goal?

Options:

A.  

next-generation firewall

B.  

traditional firewall

C.  

host-based firewall

D.  

eBPF

Discussion 0
Question # 7

The network security team of a private university is conducting a comprehensive audit to evaluate the security posture across the network infrastructure. During the review, the security team found that a trusted vendor disclosed serious vulnerabilities identified in a product that plays a crucial role in the university’s CI/CD pipeline. The security team must act promptly to mitigate the potential risks posed by these vulnerabilities. Which action must the security team take first in response to the disclosure?

Options:

A.  

Leverage IDS to measure the impact of the vulnerability.

B.  

Notify customers of the impact and its source.

C.  

Confirm impact by validating presence of the product in company’s environment.

D.  

Patch the impacted product as soon as possible.

Discussion 0
Question # 8

A financial company uses a remote access solution that directs all traffic over a secure tunnel. The company recently received some large ISP bills from the headquarter location. According to traffic analysis during the investigation, most of the network traffic was due to employees spending a lot of time on video conferences provided by a SaaS collaboration company. What must the company modify to reduce the cost without negatively impacting security or employee experience?

Options:

A.  

Reduce the video resolution size permitted within the SaaS application.

B.  

Split-exclude the video SaaS application from the VPN.

C.  

Block the video conferencing app when connected on VPN.

D.  

Suggest users to disconnect from the VPN when on video calls.

Discussion 0
Question # 9

A restaurant distribution center recently suffered a password spray attack targeting the Cisco Secure Firepower Threat Defense VPN headend. The attack attempts to gain unauthorized access by trying common passwords across many accounts. The attack poses a significant security threat to the organization’s remote access infrastructure. To enhance the security of the VPN setup and minimize the risk of similar attacks in the future, the IT security team must implement effective mitigation measures. Which technique effectively reduces the risk of this type of attack?

Options:

A.  

Implement an access list to block addresses from the previous password spray attack.

B.  

Disable group aliases in the connection profiles.

C.  

Change the AAA authentication method from RADIUS to TACACS+.

D.  

Enable AAA authentication for the DefaultWEBVPN and DefaultRAGroup Connection Profiles.

Discussion 0
Question # 10

Network administrators at a medical facility cannot log in to network devices because of excessive resource consumption and high CPU utilization. The situation has led to delays in routine maintenance and troubleshooting, which affects overall network performance. An engineer must optimize the handling of traffic to reduce the impact and maintain consistent access and operational efficiency. Which approach must be implemented to meet the requirement?

Options:

A.  

Control Plane Policing

B.  

AAA

C.  

SNMP

D.  

RBAC

Discussion 0
Get 300-745 dumps and pass your exam in 24 hours!

Free Exams Sample Questions