Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 300-745 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which tool must be used to prioritize incidents by a SOC?

Options:

A.

SIEM


B.

endpoint detection and response


C.

CloudWatch


D.

endpoint protection platform


Expert Solution
Questions # 12:

A telecommunications company recently introduced a hybrid working model. Based on the new policy, employees can work remotely for 2 days per week if corporate equipment is used. The IT department is preparing corporate laptops to support users during the remote working days. Which solution must the IT department implement that provides secure connectivity to corporate resources and protects sensitive corporate data even if a laptop is stolen?

Options:

A.

Secure Client


B.

Cisco Duo


C.

ISE Posture


D.

Umbrella


Expert Solution
Questions # 13:

A company published software that had a security vulnerability, and an attacker used the vulnerability to steal critical information from the environment. The issue was reported by the security team, and the administrator was instructed to run shift-left security tests before publishing the software. Which component of the software development pipeline must be recommended to run the tests?

Options:

A.

continuous deployment


B.

cloud security posture management


C.

software bill of material analysis


D.

source code management


Expert Solution
Questions # 14:

Which tool is used by a SOC analyst to quarantine an endpoint?

Options:

A.

flow collector


B.

syslog


C.

load balancer


D.

Cisco XDR


Expert Solution
Questions # 15:

A construction company recently introduced a BYOD policy, where contractors can bring personal devices and connect to the wireless network. The network engineer configured a Wi-Fi network with a guest splash page to provide internet access only. Although the policy was limited to wireless devices, contractors started bringing devices that needed wired connections without authorization and connecting to the network. The network team suggested shutting down ports where unauthorized devices are connected. Which technology must be implemented to ensure that wired and wireless devices are granted network access only after successful authentication?

Options:

A.

VxLANs


B.

private VLANs


C.

VACLs


D.

802.1x


Expert Solution
Questions # 16:

A manufacturing company experienced a security breach that resulted in sales data being compromised. An engineer participating in the investigation must identify who logged into the sales system during the affected period. Which approach must be used to gather the information?

Options:

A.

SNMP


B.

NACM


C.

AAA


D.

PKI


Expert Solution
Questions # 17:

Which financial reporting regulatory framework must a publicly traded company doing business in the US comply with?

Options:

A.

HIPAA


B.

SOX


C.

SOC


D.

FEDRAMP


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions