Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 300-745 Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 Exam Practice Test

Page: 1 / 6
Total 58 questions

Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 Questions and Answers

Question 1

A company recently discovered that a former employee, who left to join a competitor, continued to access and exfiltrate sensitive data over several weeks after leaving. The breach highlighted vulnerabilities in the organization’s data security and access management practices. To prevent such incidents in the future, the organization must adopt measures that detect and restrict unauthorized data access and transfer. Which mitigation strategy must be implemented to address the issue?

Options:

A.

Implement web application firewall.

B.

Upgrade network policy access.

C.

Implement data loss prevention strategy.

D.

Deploy audit logging and monitoring solution.

Question 2

An oil and gas company recently faced a security breach when an employee’s notepad, which contained critical login credentials, was stolen. The incident led to unauthorized access to a user account, which posed a significant risk to sensitive company data and operations. The company wants to adopt a security measure that enhances user account protection. Which action must be taken to prevent breaches like this from happening in the future?

Options:

A.

Implement MFA

B.

Implement single sign-on.

C.

Update the RADIUS server.

D.

Configure a password expiration policy.

Question 3

An agricultural company wants to enhance the cybersecurity posture by implementing a defense-in-depth strategy to protect against polymorphic malware threats. Currently, the company’s security infrastructure relies solely on a stateful traditional edge firewall that does not provide adequate protection against malware variants. Which technology must be added to the company’s security architecture to achieve the goal?

Options:

A.

web application firewall

B.

physical security control

C.

network performance monitor

D.

heuristics-based IPS

Question 4

A global hotel chain is using Cisco ISE and Cisco switches to manage the network. The hotel company wants to enhance network security by segmenting users and endpoints. The company must ensure that devices within the same VLAN cannot communicate with each other. The goal is to prevent cross-communication without the use of dynamic access control lists. Which action must be taken using Cisco ISE to meet the requirement?

Options:

A.

Implement device posturing.

B.

Set up endpoint profiling.

C.

Enable identity groups.

D.

Configure TrustSec.

Question 5

Which financial reporting regulatory framework must a publicly traded company doing business in the US comply with?

Options:

A.

HIPAA

B.

SOX

C.

SOC

D.

FEDRAMP

Question 6

A technology company has many remote workers who access corporate resources from various locations. The company must ensure that security policies are managed and enforced directly on endpoints, and endpoints are protected from threats regardless of location. Which firewall architecture meets the requirements?

Options:

A.

next-generation firewall

B.

host-based firewall

C.

web application firewall

D.

traditional firewall

Question 7

A developer company recently implemented a testing environment based on Linux operating system. The company needs a technology solution that produces tracing and filtering capabilities in the Linux kernel. Which technology meets these requirements without modifying the kernel source code?

Options:

A.

eBPF

B.

distributed firewall

C.

NGFW

D.

VPP

Question 8

A global marketing firm, based in California with customers on every continent, suffered a data breach that exposed employee and customer PII. Which regulations is the company in danger of violating?

Options:

A.

ISO SP800-53

B.

FedRamp

C.

GDPR

D.

ISO27001

Question 9

Employees in a healthcare organization could not access their devices when they returned to work after the weekend. The security team discovered that a threat actor had encrypted the devices. Which security solution would mitigate the risk in future?

Options:

A.

password policy enforcement

B.

network configuration management

C.

data loss prevention

D.

endpoint detection and response

Question 10

A technology company recently onboarded a new customer in the medical space. The customer needs a solution to provide data integrity across remote sites. Which solution must be used to meet this requirement?

Options:

A.

hashing

B.

data masking

C.

preshared key

D.

authentication

Question 11

Refer to the exhibit.

Question # 11

A software developer noticed that the application source code had been found on the internet. To avoid such an incident from happening again, the developer applied a DLP policy to prevent from uploading source code into generative AI tool like ChatGPT. When testing the policy, the developer noticed that it is still possible for the source code to be uploaded. Which action must the developer take to prevent this issue?

Options:

A.

Enable the rule.

B.

Move the ChatGPT Source Code rule to the bottom.

C.

Modify the data classifications.

D.

Change the DLP action from Monitor to Block.

Question 12

A company published software that had a security vulnerability, and an attacker used the vulnerability to steal critical information from the environment. The issue was reported by the security team, and the administrator was instructed to run shift-left security tests before publishing the software. Which component of the software development pipeline must be recommended to run the tests?

Options:

A.

continuous deployment

B.

cloud security posture management

C.

software bill of material analysis

D.

source code management

Question 13

A financial company uses a remote access solution that directs all traffic over a secure tunnel. The company recently received some large ISP bills from the headquarter location. According to traffic analysis during the investigation, most of the network traffic was due to employees spending a lot of time on video conferences provided by a SaaS collaboration company. What must the company modify to reduce the cost without negatively impacting security or employee experience?

Options:

A.

Reduce the video resolution size permitted within the SaaS application.

B.

Split-exclude the video SaaS application from the VPN.

C.

Block the video conferencing app when connected on VPN.

D.

Suggest users to disconnect from the VPN when on video calls.

Question 14

An IT company experienced the spread of malicious content between user endpoints, which impacted business critical resources. The company wants to implement a solution to control communication between individual endpoints on the network. Which approach achieves the goal?

Options:

A.

RADIUS

B.

TrustSec

C.

posture

D.

profiling

Question 15

Which generative AI impact is addressed by a human-in-the-loop design policy?

Options:

A.

AI hallucinations

B.

deep fakes

C.

phishing

D.

scale changes

Question 16

A developer is building new API functions for a cloud-based application. Before writing the code, the developer wants to ensure that destructive actions, including deleting and updating data, are properly protected by access control identifying sensitive fields such as those that contain passwords or personally identifiable information. Which approach must be used to score the risks proactively?

Options:

A.

Open API Specification Analysis

B.

SAST

C.

SBOM Generation

D.

CSPM

Question 17

Which tool must be used to prioritize incidents by a SOC?

Options:

A.

SIEM

B.

endpoint detection and response

C.

CloudWatch

D.

endpoint protection platform

Page: 1 / 6
Total 58 questions