Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

300-745 Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 Questions and Answers

Questions 4

A manufacturing company recently experienced a network-down scenario due to malware spread on the management network. The company wants to implement a solution to detect and mitigate a similar threat in the future and protect the overall network. Which solution meets the requirements?

Options:

A.

endpoint detection and response

B.

RADIUS

C.

encrypted threat analysis

D.

IPsec VPN

Buy Now
Questions 5

Employees in a healthcare organization could not access their devices when they returned to work after the weekend. The security team discovered that a threat actor had encrypted the devices. Which security solution would mitigate the risk in future?

Options:

A.

password policy enforcement

B.

network configuration management

C.

data loss prevention

D.

endpoint detection and response

Buy Now
Questions 6

After deploying a new API, the security team must identify the components of the application that are exposed to the internet and whether there are application authentication risks. Which technology must be deployed to discover the applications services and monitor for authentication issues?

Options:

A.

Cloud Security Posture Management

B.

API trace analysis

C.

secret scanning

D.

Cloud Workload Protection

Buy Now
Questions 7

A financial company is in the process of upgrading network access across the entire company. The solution must ensure: least privilege access control access across different network segments and increased security for employees. Which solution approach must the company take?

Options:

A.

NetFlow

B.

SNMP

C.

PKI

D.

RBAC

Buy Now
Questions 8

A global energy company moved a monolithic application from the data center to public cloud. Over time, the company added many capabilities to the application, and it is now difficult for the application team to scale it. The application owner decided to modernize the application by moving to a Kubernetes cluster. However, he wants to ensure that the new application architecture provides a container network interface that is scalable, offers options for cloud-native security, and helps with visibility and observability. Which solution must be used to accomplish the task?

Options:

A.

security group

B.

Cilium

C.

ENI

D.

ingress gateway

Buy Now
Questions 9

A developer company recently implemented a testing environment based on Linux operating system. The company needs a technology solution that produces tracing and filtering capabilities in the Linux kernel. Which technology meets these requirements without modifying the kernel source code?

Options:

A.

eBPF

B.

distributed firewall

C.

NGFW

D.

VPP

Buy Now
Questions 10

An oil and gas company recently faced a security breach when an employee’s notepad, which contained critical login credentials, was stolen. The incident led to unauthorized access to a user account, which posed a significant risk to sensitive company data and operations. The company wants to adopt a security measure that enhances user account protection. Which action must be taken to prevent breaches like this from happening in the future?

Options:

A.

Implement MFA

B.

Implement single sign-on.

C.

Update the RADIUS server.

D.

Configure a password expiration policy.

Buy Now
Questions 11

A financial company uses a remote access solution that directs all traffic over a secure tunnel. The company recently received some large ISP bills from the headquarter location. According to traffic analysis during the investigation, most of the network traffic was due to employees spending a lot of time on video conferences provided by a SaaS collaboration company. What must the company modify to reduce the cost without negatively impacting security or employee experience?

Options:

A.

Reduce the video resolution size permitted within the SaaS application.

B.

Split-exclude the video SaaS application from the VPN.

C.

Block the video conferencing app when connected on VPN.

D.

Suggest users to disconnect from the VPN when on video calls.

Buy Now
Questions 12

What does watermarking AI generated content prevent?

Options:

A.

massive resource consumption

B.

deep fakes

C.

harmful content

D.

scale changes

Buy Now
Questions 13

A restaurant distribution center recently suffered a password spray attack targeting the Cisco Secure Firepower Threat Defense VPN headend. The attack attempts to gain unauthorized access by trying common passwords across many accounts. The attack poses a significant security threat to the organization’s remote access infrastructure. To enhance the security of the VPN setup and minimize the risk of similar attacks in the future, the IT security team must implement effective mitigation measures. Which technique effectively reduces the risk of this type of attack?

Options:

A.

Implement an access list to block addresses from the previous password spray attack.

B.

Disable group aliases in the connection profiles.

C.

Change the AAA authentication method from RADIUS to TACACS+.

D.

Enable AAA authentication for the DefaultWEBVPN and DefaultRAGroup Connection Profiles.

Buy Now
Questions 14

A security engineer on an application design team must choose a framework of attack patterns to evaluate during threat modeling. Which framework provides the common set of attacks?

Options:

A.

Cisco SAFE

B.

GDPR

C.

MITRE CAPEC

D.

SOC2

Buy Now
Questions 15

A telecommunications company recently introduced a hybrid working model. Based on the new policy, employees can work remotely for 2 days per week if corporate equipment is used. The IT department is preparing corporate laptops to support users during the remote working days. Which solution must the IT department implement that provides secure connectivity to corporate resources and protects sensitive corporate data even if a laptop is stolen?

Options:

A.

Secure Client

B.

Cisco Duo

C.

ISE Posture

D.

Umbrella

Buy Now
Questions 16

A software development company uses multiple cloud providers to host applications. The company is designing a scalable firewall solution that must meet the requirements:

    Consistent security policies across multiple cloud environments.

    Centralized visibility and management.

    Scalability to accommodate different cloud platforms.

Which type of firewall meets the requirements?

Options:

A.

traditional firewall

B.

zone-based firewall

C.

distributed firewall

D.

host-based firewall

Buy Now
Questions 17

A global marketing firm, based in California with customers on every continent, suffered a data breach that exposed employee and customer PII. Which regulations is the company in danger of violating?

Options:

A.

ISO SP800-53

B.

FedRamp

C.

GDPR

D.

ISO27001

Buy Now
Exam Code: 300-745
Exam Name: Designing Cisco Security Infrastructure (300-745 SDSI) v1.0
Last Update: Feb 23, 2026
Questions: 57

PDF + Testing Engine

$65.27  $186.49

Testing Engine

$52.32  $149.49
buy now 300-745 testing engine

PDF (Q&A)

$48.12  $137.49
buy now 300-745 pdf