Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

300-745 Exam Dumps - Cisco CCNP Security Questions and Answers

Question # 14

In preparation for an upcoming security audit, a metal production company decided to enhance the security of container-based services running in a Kubernetes environment. The company wants to ensure that all communications between applications and services are encrypted. The administrator plans to implement mTLS service between application and services to secure the data exchanges. Given the need to manage encryption at scale and maintain efficient communication across the cluster, which network transport technology must be employed?

Options:

A.

ingress controller

B.

load balancing

C.

Kubernetes network policies

D.

Service Mesh

Buy Now
Question # 15

A construction company recently introduced a BYOD policy, where contractors can bring personal devices and connect to the wireless network. The network engineer configured a Wi-Fi network with a guest splash page to provide internet access only. Although the policy was limited to wireless devices, contractors started bringing devices that needed wired connections without authorization and connecting to the network. The network team suggested shutting down ports where unauthorized devices are connected. Which technology must be implemented to ensure that wired and wireless devices are granted network access only after successful authentication?

Options:

A.

VxLANs

B.

private VLANs

C.

VACLs

D.

802.1x

Buy Now
Question # 16

A company recently discovered that a former employee, who left to join a competitor, continued to access and exfiltrate sensitive data over several weeks after leaving. The breach highlighted vulnerabilities in the organization’s data security and access management practices. To prevent such incidents in the future, the organization must adopt measures that detect and restrict unauthorized data access and transfer. Which mitigation strategy must be implemented to address the issue?

Options:

A.

Implement web application firewall.

B.

Upgrade network policy access.

C.

Implement data loss prevention strategy.

D.

Deploy audit logging and monitoring solution.

Buy Now
Question # 17

A legal services company wants to prevent remote employees from accessing personal email and social media accounts while using corporate laptops. Which security solution enforces the policy?

Options:

A.

Cisco TrustSec

B.

RADIUS server

C.

Cisco Umbrella

D.

network monitoring tool

Buy Now
Question # 18

A retail company is facing a series of cyberattacks targeting web servers, which results in disruptions to online services. Upon investigation, the security team identified that these attacks involved invalid HTTP request headers, which were used to exploit vulnerabilities in the web application. To safeguard the company websites against similar threats in the future, the security team must deploy a security solution specifically designed to detect and block such malicious web traffic. Which security product must be used to protect the websites from similar attacks?

Options:

A.

antivirus software

B.

traditional firewall

C.

web application firewall

D.

host-based firewall

Buy Now
Question # 19

A telecommunications company recently introduced a hybrid working model. Based on the new policy, employees can work remotely for 2 days per week if corporate equipment is used. The IT department is preparing corporate laptops to support users during the remote working days. Which solution must the IT department implement that provides secure connectivity to corporate resources and protects sensitive corporate data even if a laptop is stolen?

Options:

A.

Secure Client

B.

Cisco Duo

C.

ISE Posture

D.

Umbrella

Buy Now
Question # 20

A company has been facing recurring issues with SQL injection vulnerabilities affecting the products, leading to significant disruptions for customers. To address the security concerns proactively, the company wants to integrate a tool into the CI/CD pipeline. The tool must be capable of identifying vulnerabilities such as SQL injection early in the development process, which allows developers to rectify issues before the code is deployed. Which solution must be implemented to meet the requirement?

Options:

A.

Static Application Security Testing tools, such as Checkmarx, Fortify, SonarQube

B.

build log observability tools, such as Splunk, Datadog

C.

workflow automation tools, such as GitHub Actions, Azure

D.

Dynamic Application Security Testing tools, such as OWASP ZAP, Veracode, Burp Suite

Buy Now
Exam Code: 300-745
Exam Name: Designing Cisco Security Infrastructure (300-745 SDSI) v1.0
Last Update: Mar 1, 2026
Questions: 57
300-745 pdf

300-745 PDF

$28.5  $94.99
300-745 Engine

300-745 Testing Engine

$33  $109.99
300-745 PDF + Engine

300-745 PDF + Testing Engine

$43.5  $144.99