Cisco 300-745最新な問題集 & 300-745参考資料すべての顧客のニーズを満たすために、当社はこの分野で多くの主要な専門家と教授を採用しました。これらの専門家と教授は、お客様向けに高品質の300-745試験問題を設計しました。当社の製品がすべての人々に適していると約束できます。 300-745実践教材を購入して真剣に検討する限り、短時間で試験に合格して認定を取得することをお約束します。 300-745試験の質問を選択してレビューに役立ててください。300-745スタディガイドから多くのメリットを得ることができます。 Cisco Designing Cisco Security Infrastructure 認定 300-745 試験問題 (Q70-Q75):質問 # 70
A developer company recently implemented a testing environment based on Linux operating system. The company needs a technology solution that produces tracing and filtering capabilities in the Linux kernel. Which technology meets these requirements without modifying the kernel source code?
A. distributed firewall
B. VPP
C. eBPF
D. NGFW
正解:C
解説:
eBPF (extended Berkeley Packet Filter) allows tracing, filtering, and monitoring directly inside the Linux kernel without modifying the kernel source code. It provides deep visibility into system and application behavior, making it ideal for secure and efficient observability in a testing environment.
質問 # 71
Which two solutions help ensure consistent policy enforcement across multi-cloud workloads?
(Choose two.)
A. Cisco Secure Workload (Tetration)
B. Cloud-delivered Firewall (CDFW)
C. Static IP routing
D. SNMP traps
正解:A、B
解説:
Cisco Secure Workload provides workload visibility and policy enforcement across environments, while cloud-delivered firewalls apply consistent security policies across multiple cloud platforms.
質問 # 72
After a recent security breach, a financial company is reassessing their overall security posture and strategy to better protect sensitive data and resources. The company already deployed on- premises next-generation firewalls at the network edge for each branch location. Security measures must be enhanced at the endpoint level. The goal is to implement a solution that provides additional traffic filtering directly on endpoint devices, thereby offering another layer of defense against potential threats. Which technology must be implemented to meet the requirement?
A. distributed firewall
B. traditional firewall
C. host-based firewall
D. web application firewall
正解:C
解説:
A host-based firewall runs directly on endpoint devices, providing traffic filtering and protection at the endpoint level. This adds another layer of defense beyond the network edge firewalls, ensuring threats are mitigated closer to where sensitive data resides.
質問 # 73
Network administrators at a medical facility cannot log in to network devices because of excessive resource consumption and high CPU utilization. The situation has led to delays in routine maintenance and troubleshooting, which affects overall network performance. An engineer must optimize the handling of traffic to reduce the impact and maintain consistent access and operational efficiency. Which approach must be implemented to meet the requirement?
A. RBAC
B. AAA
C. Control Plane Policing
D. SNMP
正解:C
解説:
Control Plane Policing (CoPP) protects the CPU of network devices by filtering and rate-limiting control plane traffic. This prevents excessive resource consumption, ensures stability, and maintains administrator access for maintenance and troubleshooting.
質問 # 74
A healthcare organization in the United States recently discovered that a highly confidential report name Records ______ that includes patient records name Patient_Medical_Records _____ was accessed by unauthorized personnel internally. The breach occurred due to lack of protection measures in place for patient electronic medical records. Which regulatory compliance is directly appropriate and must be adopted?
A. PCI DSS
B. FERPA
C. FISMA
D. HIPAA
正解:D
解説:
The Health Insurance Portability and Accountability Act (HIPAA) is the U.S. regulation that governs the protection of patient medical records and electronic health information. Since the breach involved unauthorized access to patient medical records, HIPAA compliance is directly required.