Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

300-745 Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 Questions and Answers

Questions 4

A global marketing firm, based in California with customers on every continent, suffered a data breach that exposed employee and customer PII. Which regulations is the company in danger of violating?

Options:

A.

ISO SP800-53

B.

FedRamp

C.

GDPR

D.

ISO27001

Buy Now
Questions 5

A retail company is facing a series of cyberattacks targeting web servers, which results in disruptions to online services. Upon investigation, the security team identified that these attacks involved invalid HTTP request headers, which were used to exploit vulnerabilities in the web application. To safeguard the company websites against similar threats in the future, the security team must deploy a security solution specifically designed to detect and block such malicious web traffic. Which security product must be used to protect the websites from similar attacks?

Options:

A.

antivirus software

B.

traditional firewall

C.

web application firewall

D.

host-based firewall

Buy Now
Questions 6

A software development company uses multiple cloud providers to host applications. The company is designing a scalable firewall solution that must meet the requirements:

    Consistent security policies across multiple cloud environments.

    Centralized visibility and management.

    Scalability to accommodate different cloud platforms.

Which type of firewall meets the requirements?

Options:

A.

traditional firewall

B.

zone-based firewall

C.

distributed firewall

D.

host-based firewall

Buy Now
Questions 7

A construction company recently introduced a BYOD policy, where contractors can bring personal devices and connect to the wireless network. The network engineer configured a Wi-Fi network with a guest splash page to provide internet access only. Although the policy was limited to wireless devices, contractors started bringing devices that needed wired connections without authorization and connecting to the network. The network team suggested shutting down ports where unauthorized devices are connected. Which technology must be implemented to ensure that wired and wireless devices are granted network access only after successful authentication?

Options:

A.

VxLANs

B.

private VLANs

C.

VACLs

D.

802.1x

Buy Now
Questions 8

A financial company is focused on proactively protecting sensitive data stored on the devices. The company recognizes the potential risks associated with lost or stolen devices and they want a solution to ensure that if unauthorized user access the device, the data it contains is not accessible or misused. The solution includes implementing a strategy that renders data unreadable without user authentication. Which solution meets the requirement?

Options:

A.

Install Kensington Lock.

B.

Use a BIOS password.

C.

Implement data encryption on disk.

D.

Apply GPS tracking.

Buy Now
Questions 9

Which design policy addresses harmful content creation by generative AI?

Options:

A.

quantum resistant encryption

B.

watermarking

C.

retrieval augmented generation

D.

human in the loop

Buy Now
Questions 10

After deploying a new API, the security team must identify the components of the application that are exposed to the internet and whether there are application authentication risks. Which technology must be deployed to discover the applications services and monitor for authentication issues?

Options:

A.

Cloud Security Posture Management

B.

API trace analysis

C.

secret scanning

D.

Cloud Workload Protection

Buy Now
Questions 11

Which tool is used by a SOC analyst to quarantine an endpoint?

Options:

A.

flow collector

B.

syslog

C.

load balancer

D.

Cisco XDR

Buy Now
Questions 12

A global hotel chain is using Cisco ISE and Cisco switches to manage the network. The hotel company wants to enhance network security by segmenting users and endpoints. The company must ensure that devices within the same VLAN cannot communicate with each other. The goal is to prevent cross-communication without the use of dynamic access control lists. Which action must be taken using Cisco ISE to meet the requirement?

Options:

A.

Implement device posturing.

B.

Set up endpoint profiling.

C.

Enable identity groups.

D.

Configure TrustSec.

Buy Now
Questions 13

A software development company relies on GitHub for managing the source code and is committed to maintaining application security. The company must ensure that known software vulnerabilities are not introduced to the application. The company needs a capability within GitHub that can analyze semantic versioning and flag any software components that pose security risks. Which GitHub feature must be used?

Options:

A.

Depend-a-bot

B.

Sealed boxes

C.

GitHub Actions

D.

Artifact attestations

Buy Now
Questions 14

A company has been facing recurring issues with SQL injection vulnerabilities affecting the products, leading to significant disruptions for customers. To address the security concerns proactively, the company wants to integrate a tool into the CI/CD pipeline. The tool must be capable of identifying vulnerabilities such as SQL injection early in the development process, which allows developers to rectify issues before the code is deployed. Which solution must be implemented to meet the requirement?

Options:

A.

Static Application Security Testing tools, such as Checkmarx, Fortify, SonarQube

B.

build log observability tools, such as Splunk, Datadog

C.

workflow automation tools, such as GitHub Actions, Azure

D.

Dynamic Application Security Testing tools, such as OWASP ZAP, Veracode, Burp Suite

Buy Now
Questions 15

A manufacturing company experienced a security breach that resulted in sales data being compromised. An engineer participating in the investigation must identify who logged into the sales system during the affected period. Which approach must be used to gather the information?

Options:

A.

SNMP

B.

NACM

C.

AAA

D.

PKI

Buy Now
Questions 16

An IT company experienced the spread of malicious content between user endpoints, which impacted business critical resources. The company wants to implement a solution to control communication between individual endpoints on the network. Which approach achieves the goal?

Options:

A.

RADIUS

B.

TrustSec

C.

posture

D.

profiling

Buy Now
Questions 17

A telecommunications company recently introduced a hybrid working model. Based on the new policy, employees can work remotely for 2 days per week if corporate equipment is used. The IT department is preparing corporate laptops to support users during the remote working days. Which solution must the IT department implement that provides secure connectivity to corporate resources and protects sensitive corporate data even if a laptop is stolen?

Options:

A.

Secure Client

B.

Cisco Duo

C.

ISE Posture

D.

Umbrella

Buy Now
Exam Code: 300-745
Exam Name: Designing Cisco Security Infrastructure (300-745 SDSI) v1.0
Last Update: Apr 11, 2026
Questions: 58

PDF + Testing Engine

$65.27  $186.49

Testing Engine

$52.32  $149.49
buy now 300-745 testing engine

PDF (Q&A)

$48.12  $137.49
buy now 300-745 pdf