Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

300-745 Exam Dumps - Cisco CCNP Security Questions and Answers

Question # 4

A technology company has many remote workers who access corporate resources from various locations. The company must ensure that security policies are managed and enforced directly on endpoints, and endpoints are protected from threats regardless of location. Which firewall architecture meets the requirements?

Options:

A.

next-generation firewall

B.

host-based firewall

C.

web application firewall

D.

traditional firewall

Buy Now
Question # 5

Which tool must be used to prioritize incidents by a SOC?

Options:

A.

SIEM

B.

endpoint detection and response

C.

CloudWatch

D.

endpoint protection platform

Buy Now
Question # 6

After a recent security breach, a financial company is reassessing their overall security posture and strategy to better protect sensitive data and resources. The company already deployed on-premises next-generation firewalls at the network edge for each branch location. Security measures must be enhanced at the endpoint level. The goal is to implement a solution that provides additional traffic filtering directly on endpoint devices, thereby offering another layer of defense against potential threats. Which technology must be implemented to meet the requirement?

Options:

A.

host-based firewall

B.

web application firewall

C.

distributed firewall

D.

traditional firewall

Buy Now
Question # 7

How does a SOC leverage flow collectors?

Options:

A.

It performs data backup and recovery.

B.

It performs load balancing capabilities across systems to optimize performance.

C.

It provides data for analysis in threat detection and response system.

D.

It provides real-time content filtering.

Buy Now
Question # 8

A global energy company moved a monolithic application from the data center to public cloud. Over time, the company added many capabilities to the application, and it is now difficult for the application team to scale it. The application owner decided to modernize the application by moving to a Kubernetes cluster. However, he wants to ensure that the new application architecture provides a container network interface that is scalable, offers options for cloud-native security, and helps with visibility and observability. Which solution must be used to accomplish the task?

Options:

A.

security group

B.

Cilium

C.

ENI

D.

ingress gateway

Buy Now
Question # 9

Refer to the exhibit.

A software developer noticed that the application source code had been found on the internet. To avoid such an incident from happening again, the developer applied a DLP policy to prevent from uploading source code into generative AI tool like ChatGPT. When testing the policy, the developer noticed that it is still possible for the source code to be uploaded. Which action must the developer take to prevent this issue?

Options:

A.

Enable the rule.

B.

Move the ChatGPT Source Code rule to the bottom.

C.

Modify the data classifications.

D.

Change the DLP action from Monitor to Block.

Buy Now
Question # 10

How is generative AI used in securing networks?

Options:

A.

to provide real-time load balancing

B.

to improve resource consumption

C.

to perform real-time audits to ensure regulatory compliance

D.

to detect unusual patterns in network traffic

Buy Now
Question # 11

A global marketing firm, based in California with customers on every continent, suffered a data breach that exposed employee and customer PII. Which regulations is the company in danger of violating?

Options:

A.

ISO SP800-53

B.

FedRamp

C.

GDPR

D.

ISO27001

Buy Now
Question # 12

A bank experienced challenges with compromised endpoints gaining access to the internal network. To enhance security, the bank wants to ensure that all endpoints are scanned for compliance checks before being allowed to access the network. Which action achieves the level of security and control?

Options:

A.

Use MFA using Cisco DUO.

B.

Configure TrustSec using Cisco ISE.

C.

Set up data loss prevention policy.

D.

Implement Posture validation using Cisco ISE.

Buy Now
Question # 13

Considering recent cybersecurity threats, a company wants to improve the process for identifying, assessing, and managing risks with a comprehensive and holistic approach. Which framework must be used to meet these requirements?

Options:

A.

HIPPA

B.

MITRE CAPEC

C.

NIST SP 800-37

D.

GDPR

Buy Now
Exam Code: 300-745
Exam Name: Designing Cisco Security Infrastructure (300-745 SDSI) v1.0
Last Update: Feb 28, 2026
Questions: 57
300-745 pdf

300-745 PDF

$28.5  $94.99
300-745 Engine

300-745 Testing Engine

$33  $109.99
300-745 PDF + Engine

300-745 PDF + Testing Engine

$43.5  $144.99