Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 300-745 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

A restaurant distribution center recently suffered a password spray attack targeting the Cisco Secure Firepower Threat Defense VPN headend. The attack attempts to gain unauthorized access by trying common passwords across many accounts. The attack poses a significant security threat to the organization’s remote access infrastructure. To enhance the security of the VPN setup and minimize the risk of similar attacks in the future, the IT security team must implement effective mitigation measures. Which technique effectively reduces the risk of this type of attack?

Options:

A.

Implement an access list to block addresses from the previous password spray attack.


B.

Disable group aliases in the connection profiles.


C.

Change the AAA authentication method from RADIUS to TACACS+.


D.

Enable AAA authentication for the DefaultWEBVPN and DefaultRAGroup Connection Profiles.


Expert Solution
Questions # 2:

A product manager is focused on maintaining the security integrity of a microservice-based application as new features are developed and integrated. To ensure that known software vulnerabilities are not introduced into the product, it is crucial to implement a robust application security technique. The technique must be applied during the build phase of the software development lifecycle, which allows the team to proactively identify and address vulnerability risks before deployment. Which application security technique must be applied to accomplish the goal?

Options:

A.

secret detection


B.

container scanning


C.

infrastructure as code scanning


D.

Open API specification analysis


Expert Solution
Questions # 3:

Which benefit does AI provide in network security?

Options:

A.

It speeds up network data transmission rates.


B.

It replaces comprehensive defense in depth.


C.

It provides complete protection from DDoS attacks.


D.

It identifies vulnerabilities associated with weak TLS algorithms.


Expert Solution
Questions # 4:

Which tool is used to collect, analyze, and visualize logs from network devices, endpoints, and other sources in an enterprise?

Options:

A.

Cisco Email Security Appliance


B.

Cloud Observability


C.

Cisco Web Security Appliance


D.

Splunk


Expert Solution
Questions # 5:

A company has been facing recurring issues with SQL injection vulnerabilities affecting the products, leading to significant disruptions for customers. To address the security concerns proactively, the company wants to integrate a tool into the CI/CD pipeline. The tool must be capable of identifying vulnerabilities such as SQL injection early in the development process, which allows developers to rectify issues before the code is deployed. Which solution must be implemented to meet the requirement?

Options:

A.

Static Application Security Testing tools, such as Checkmarx, Fortify, SonarQube


B.

build log observability tools, such as Splunk, Datadog


C.

workflow automation tools, such as GitHub Actions, Azure


D.

Dynamic Application Security Testing tools, such as OWASP ZAP, Veracode, Burp Suite


Expert Solution
Questions # 6:

A company recently discovered that a former employee, who left to join a competitor, continued to access and exfiltrate sensitive data over several weeks after leaving. The breach highlighted vulnerabilities in the organization’s data security and access management practices. To prevent such incidents in the future, the organization must adopt measures that detect and restrict unauthorized data access and transfer. Which mitigation strategy must be implemented to address the issue?

Options:

A.

Implement web application firewall.


B.

Upgrade network policy access.


C.

Implement data loss prevention strategy.


D.

Deploy audit logging and monitoring solution.


Expert Solution
Questions # 7:

A manufacturing company recently experienced a network-down scenario due to malware spread on the management network. The company wants to implement a solution to detect and mitigate a similar threat in the future and protect the overall network. Which solution meets the requirements?

Options:

A.

endpoint detection and response


B.

RADIUS


C.

encrypted threat analysis


D.

IPsec VPN


Expert Solution
Questions # 8:

A security engineer on an application design team must choose a framework of attack patterns to evaluate during threat modeling. Which framework provides the common set of attacks?

Options:

A.

Cisco SAFE


B.

GDPR


C.

MITRE CAPEC


D.

SOC2


Expert Solution
Questions # 9:

After a recent security breach, a financial company is reassessing their overall security posture and strategy to better protect sensitive data and resources. The company already deployed on-premises next-generation firewalls at the network edge for each branch location. Security measures must be enhanced at the endpoint level. The goal is to implement a solution that provides additional traffic filtering directly on endpoint devices, thereby offering another layer of defense against potential threats. Which technology must be implemented to meet the requirement?

Options:

A.

host-based firewall


B.

web application firewall


C.

distributed firewall


D.

traditional firewall


Expert Solution
Questions # 10:

How does a SOC leverage flow collectors?

Options:

A.

It performs data backup and recovery.


B.

It performs load balancing capabilities across systems to optimize performance.


C.

It provides data for analysis in threat detection and response system.


D.

It provides real-time content filtering.


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions