Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco 300-745 Exam - Topic 1 Question 2 Discussion

Actual exam question for Cisco's 300-745 exam
Question #: 2
Topic #: 1
[All 300-745 Questions]

After deploying a new API, the security team must identify the components of the application that are exposed to the internet and whether there are application authentication risks. Which technology must be deployed to discover the applications services and monitor for authentication issues?

Show Suggested Answer Hide Answer
Suggested Answer: B

Securing APIs requires visibility into the 'runtime' behavior of the application. API trace analysis (often part of an API Security solution like Cisco Panoptica) is the technology used to automatically discover API endpoints and analyze the traffic flowing through them. This process identifies 'shadow APIs' (undocumented endpoints) that are exposed to the internet and inspects the headers and payloads for authentication risks, such as missing tokens or broken object-level authorization (BOLA).

By monitoring actual traffic traces, the security team can confirm if the API is following the intended security design or if it is leaking sensitive data due to poor authentication implementation. Cloud Security Posture Management (CSPM) (Option A) focuses on the configuration of the cloud infrastructure (like an open S3 bucket) rather than the internal logic of an API's authentication. Secret scanning (Option C) is a 'shift-left' technique used to find hardcoded passwords in source code during the build phase, not for monitoring live traffic. Cloud Workload Protection (CWPP) (Option D) focuses on protecting the underlying host or container from malware and exploits. Only API trace analysis provides the specific visibility into service discovery and application-layer authentication health required in the Cisco SDSI v1.0 objectives for modern DevSecOps environments.


Contribute your Thoughts:

0/2000 characters
I feel like secret scanning is more about finding exposed credentials rather than monitoring services.
upvoted 0 times
...
Erick
5 days ago
I'm not entirely sure, but I remember something about Cloud Security Posture Management being used for visibility.
upvoted 0 times
...
Sabra
10 days ago
I think it's related to monitoring, so maybe API trace analysis? That sounds familiar from our practice questions.
upvoted 0 times
...

Save Cancel