Spring Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 2
Total 17 questions
Exam Code: 300-745                Update: Mar 21, 2026
Exam Name: Designing Cisco Security Infrastructure (300-745 SDSI) v1.0

Cisco Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 300-745 Exam Dumps: Updated Questions & Answers (March 2026)

Question # 1

A furniture company recently discovered that the endpoint detection and response configuration flagged several malicious files on company-managed laptops. The company must enhance security to prevent known malicious files from being delivered to the network and endpoints. The new solution must enhance the company’s ability to inspect and filter incoming traffic effectively. Which security product must be used to accomplish this goal?

A.

next-generation firewall

B.

traditional firewall

C.

host-based firewall

D.

eBPF

Question # 2

A technology company recently onboarded a new customer in the medical space. The customer needs a solution to provide data integrity across remote sites. Which solution must be used to meet this requirement?

A.

hashing

B.

data masking

C.

preshared key

D.

authentication

Question # 3

A restaurant distribution center recently suffered a password spray attack targeting the Cisco Secure Firepower Threat Defense VPN headend. The attack attempts to gain unauthorized access by trying common passwords across many accounts. The attack poses a significant security threat to the organization’s remote access infrastructure. To enhance the security of the VPN setup and minimize the risk of similar attacks in the future, the IT security team must implement effective mitigation measures. Which technique effectively reduces the risk of this type of attack?

A.

Implement an access list to block addresses from the previous password spray attack.

B.

Disable group aliases in the connection profiles.

C.

Change the AAA authentication method from RADIUS to TACACS+.

D.

Enable AAA authentication for the DefaultWEBVPN and DefaultRAGroup Connection Profiles.

Question # 4

A security engineer on an application design team must choose a framework of attack patterns to evaluate during threat modeling. Which framework provides the common set of attacks?

A.

Cisco SAFE

B.

GDPR

C.

MITRE CAPEC

D.

SOC2

Question # 5

A software development company uses multiple cloud providers to host applications. The company is designing a scalable firewall solution that must meet the requirements:

    Consistent security policies across multiple cloud environments.

    Centralized visibility and management.

    Scalability to accommodate different cloud platforms.

Which type of firewall meets the requirements?

A.

traditional firewall

B.

zone-based firewall

C.

distributed firewall

D.

host-based firewall

Question # 6

What is a use for AI in securing network infrastructure?

A.

known day zero attack detection

B.

load balancing

C.

traffic shaping

D.

quality of service

Question # 7

A manufacturing company implemented IoT devices throughout their smart factory and needs a security solution that meets these requirements:

    Protect IoT devices from network-based attacks.

    Visibility into communication patterns.

    Anomaly detection for IoT traffic.

Which firewall technology or feature should be recommended?

A.

zone-based firewall

B.

transparent firewall

C.

traditional firewall

D.

IPS/IDS

Question # 8

A construction company recently introduced a BYOD policy, where contractors can bring personal devices and connect to the wireless network. The network engineer configured a Wi-Fi network with a guest splash page to provide internet access only. Although the policy was limited to wireless devices, contractors started bringing devices that needed wired connections without authorization and connecting to the network. The network team suggested shutting down ports where unauthorized devices are connected. Which technology must be implemented to ensure that wired and wireless devices are granted network access only after successful authentication?

A.

VxLANs

B.

private VLANs

C.

VACLs

D.

802.1x

Question # 9

A manufacturing company experienced a security breach that resulted in sales data being compromised. An engineer participating in the investigation must identify who logged into the sales system during the affected period. Which approach must be used to gather the information?

A.

SNMP

B.

NACM

C.

AAA

D.

PKI

Question # 10

A legal services company wants to prevent remote employees from accessing personal email and social media accounts while using corporate laptops. Which security solution enforces the policy?

A.

Cisco TrustSec

B.

RADIUS server

C.

Cisco Umbrella

D.

network monitoring tool

Page: 1 / 2
Total 17 questions

Most Popular Certification Exams

Payment

       

Contact us

Site Secure

mcafee secure

TESTED 21 Mar 2026