Pre-Summer Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

300-745 Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 Questions and Answers

Questions 4

A legal services company wants to prevent remote employees from accessing personal email and social media accounts while using corporate laptops. Which security solution enforces the policy?

Options:

A.

Cisco TrustSec

B.

RADIUS server

C.

Cisco Umbrella

D.

network monitoring tool

Buy Now
Questions 5

Which tool is used by a SOC analyst to quarantine an endpoint?

Options:

A.

flow collector

B.

syslog

C.

load balancer

D.

Cisco XDR

Buy Now
Questions 6

A video game company identified a potential threat of a SYN flood attack, which could disrupt the online gaming services and impact user experience. The attack can overwhelm network resources by exploiting the TCP handshake process, leading to server unavailability and degraded performance. To safeguard the company's infrastructure and ensure uninterrupted service, it is essential to enhance the security measures in place. The company must implement a solution that manages and mitigates the risk of such network-based attacks. Which security product must be implemented to mitigate similar risks?

Options:

A.

Cisco Web Security Appliance

B.

Cisco Umbrella

C.

Cisco Secure Endpoint

D.

Cisco Secure Firewall

Buy Now
Questions 7

Considering recent cybersecurity threats, a company wants to improve the process for identifying, assessing, and managing risks with a comprehensive and holistic approach. Which framework must be used to meet these requirements?

Options:

A.

HIPPA

B.

MITRE CAPEC

C.

NIST SP 800-37

D.

GDPR

Buy Now
Questions 8

After deploying a new API, the security team must identify the components of the application that are exposed to the internet and whether there are application authentication risks. Which technology must be deployed to discover the applications services and monitor for authentication issues?

Options:

A.

Cloud Security Posture Management

B.

API trace analysis

C.

secret scanning

D.

Cloud Workload Protection

Buy Now
Questions 9

A financial company is in the process of upgrading network access across the entire company. The solution must ensure: least privilege access control access across different network segments and increased security for employees. Which solution approach must the company take?

Options:

A.

NetFlow

B.

SNMP

C.

PKI

D.

RBAC

Buy Now
Questions 10

An employee of a pharmaceutical company accidentally checked in code that contains AWS secret keys to a public GitHub repository, which exposes production resources to attackers. Which mitigation strategy must a security engineer recommend to prevent future reoccurrence?

Options:

A.

Add a web application firewall.

B.

Implement a more granular port security strategy.

C.

Implement a phishing education campaign.

D.

Configure a SCM precommit hook.

Buy Now
Questions 11

A financial company is focused on proactively protecting sensitive data stored on the devices. The company recognizes the potential risks associated with lost or stolen devices and they want a solution to ensure that if unauthorized user access the device, the data it contains is not accessible or misused. The solution includes implementing a strategy that renders data unreadable without user authentication. Which solution meets the requirement?

Options:

A.

Install Kensington Lock.

B.

Use a BIOS password.

C.

Implement data encryption on disk.

D.

Apply GPS tracking.

Buy Now
Questions 12

What is a use for AI in securing network infrastructure?

Options:

A.

known day zero attack detection

B.

load balancing

C.

traffic shaping

D.

quality of service

Buy Now
Questions 13

A software development company relies on GitHub for managing the source code and is committed to maintaining application security. The company must ensure that known software vulnerabilities are not introduced to the application. The company needs a capability within GitHub that can analyze semantic versioning and flag any software components that pose security risks. Which GitHub feature must be used?

Options:

A.

Depend-a-bot

B.

Sealed boxes

C.

GitHub Actions

D.

Artifact attestations

Buy Now
Questions 14

A company published software that had a security vulnerability, and an attacker used the vulnerability to steal critical information from the environment. The issue was reported by the security team, and the administrator was instructed to run shift-left security tests before publishing the software. Which component of the software development pipeline must be recommended to run the tests?

Options:

A.

continuous deployment

B.

cloud security posture management

C.

software bill of material analysis

D.

source code management

Buy Now
Questions 15

An agricultural company wants to enhance the cybersecurity posture by implementing a defense-in-depth strategy to protect against polymorphic malware threats. Currently, the company’s security infrastructure relies solely on a stateful traditional edge firewall that does not provide adequate protection against malware variants. Which technology must be added to the company’s security architecture to achieve the goal?

Options:

A.

web application firewall

B.

physical security control

C.

network performance monitor

D.

heuristics-based IPS

Buy Now
Questions 16

The network security team of a private university is conducting a comprehensive audit to evaluate the security posture across the network infrastructure. During the review, the security team found that a trusted vendor disclosed serious vulnerabilities identified in a product that plays a crucial role in the university’s CI/CD pipeline. The security team must act promptly to mitigate the potential risks posed by these vulnerabilities. Which action must the security team take first in response to the disclosure?

Options:

A.

Leverage IDS to measure the impact of the vulnerability.

B.

Notify customers of the impact and its source.

C.

Confirm impact by validating presence of the product in company’s environment.

D.

Patch the impacted product as soon as possible.

Buy Now
Questions 17

A bank experienced challenges with compromised endpoints gaining access to the internal network. To enhance security, the bank wants to ensure that all endpoints are scanned for compliance checks before being allowed to access the network. Which action achieves the level of security and control?

Options:

A.

Use MFA using Cisco DUO.

B.

Configure TrustSec using Cisco ISE.

C.

Set up data loss prevention policy.

D.

Implement Posture validation using Cisco ISE.

Buy Now
Exam Code: 300-745
Exam Name: Designing Cisco Security Infrastructure (300-745 SDSI) v1.0
Last Update: Apr 12, 2026
Questions: 58
300-745 pdf

300-745 PDF

$28.5  $94.99
300-745 Engine

300-745 Testing Engine

$33  $109.99
300-745 PDF + Engine

300-745 PDF + Testing Engine

$43.5  $144.99