Spring Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the Cisco CCNP Security 300-745 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 300-745 Premium Access

View all detail and faqs for the 300-745 exam


459 Students Passed

85% Average Score

93% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which financial reporting regulatory framework must a publicly traded company doing business in the US comply with?

Options:

A.

HIPAA

B.

SOX

C.

SOC

D.

FEDRAMP

Questions # 2:

An oil and gas company recently faced a security breach when an employee’s notepad, which contained critical login credentials, was stolen. The incident led to unauthorized access to a user account, which posed a significant risk to sensitive company data and operations. The company wants to adopt a security measure that enhances user account protection. Which action must be taken to prevent breaches like this from happening in the future?

Options:

A.

Implement MFA

B.

Implement single sign-on.

C.

Update the RADIUS server.

D.

Configure a password expiration policy.

Questions # 3:

A company recently discovered that a former employee, who left to join a competitor, continued to access and exfiltrate sensitive data over several weeks after leaving. The breach highlighted vulnerabilities in the organization’s data security and access management practices. To prevent such incidents in the future, the organization must adopt measures that detect and restrict unauthorized data access and transfer. Which mitigation strategy must be implemented to address the issue?

Options:

A.

Implement web application firewall.

B.

Upgrade network policy access.

C.

Implement data loss prevention strategy.

D.

Deploy audit logging and monitoring solution.

Questions # 4:

A technology company recently onboarded a new customer in the medical space. The customer needs a solution to provide data integrity across remote sites. Which solution must be used to meet this requirement?

Options:

A.

hashing

B.

data masking

C.

preshared key

D.

authentication

Questions # 5:

An IT company operates an application in a SaaS model. The administrative tasks, such as customer onboarding, within the application must be restricted to users who are on the corporate network where admins can access those functions via a web browser or a smartphone application. Which application technology must be used to provide granular control based on function?

Options:

A.

VPC

B.

RBAC

C.

security group

D.

Service Mesh

Questions # 6:

Which tool must be used to prioritize incidents by a SOC?

Options:

A.

SIEM

B.

endpoint detection and response

C.

CloudWatch

D.

endpoint protection platform

Questions # 7:

A global marketing firm, based in California with customers on every continent, suffered a data breach that exposed employee and customer PII. Which regulations is the company in danger of violating?

Options:

A.

ISO SP800-53

B.

FedRamp

C.

GDPR

D.

ISO27001

Questions # 8:

A software development company relies on GitHub for managing the source code and is committed to maintaining application security. The company must ensure that known software vulnerabilities are not introduced to the application. The company needs a capability within GitHub that can analyze semantic versioning and flag any software components that pose security risks. Which GitHub feature must be used?

Options:

A.

Depend-a-bot

B.

Sealed boxes

C.

GitHub Actions

D.

Artifact attestations

Questions # 9:

What is a use for AI in securing network infrastructure?

Options:

A.

known day zero attack detection

B.

load balancing

C.

traffic shaping

D.

quality of service

Questions # 10:

A company hosted multiple applications in the Kubernetes environment, using the naming app01, app02, and so on. An app01 user could access app02 data because no security measures are implemented. The administrator decided to place each application within a separate namespace and ensure that the namespaces are completely isolated and cannot communicate with each other. Which solution must be used to accomplish the task?

Options:

A.

HTTPRoute

B.

RoleBinding

C.

NetworkPolicy

D.

Gateway

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.