Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

300-745 Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 Questions and Answers

Questions 4

An employee of a pharmaceutical company accidentally checked in code that contains AWS secret keys to a public GitHub repository, which exposes production resources to attackers. Which mitigation strategy must a security engineer recommend to prevent future reoccurrence?

Options:

A.

Add a web application firewall.

B.

Implement a more granular port security strategy.

C.

Implement a phishing education campaign.

D.

Configure a SCM precommit hook.

Buy Now
Questions 5

A financial company uses a remote access solution that directs all traffic over a secure tunnel. The company recently received some large ISP bills from the headquarter location. According to traffic analysis during the investigation, most of the network traffic was due to employees spending a lot of time on video conferences provided by a SaaS collaboration company. What must the company modify to reduce the cost without negatively impacting security or employee experience?

Options:

A.

Reduce the video resolution size permitted within the SaaS application.

B.

Split-exclude the video SaaS application from the VPN.

C.

Block the video conferencing app when connected on VPN.

D.

Suggest users to disconnect from the VPN when on video calls.

Buy Now
Questions 6

What is a use for AI in securing network infrastructure?

Options:

A.

known day zero attack detection

B.

load balancing

C.

traffic shaping

D.

quality of service

Buy Now
Questions 7

After a recent security breach, a financial company is reassessing their overall security posture and strategy to better protect sensitive data and resources. The company already deployed on-premises next-generation firewalls at the network edge for each branch location. Security measures must be enhanced at the endpoint level. The goal is to implement a solution that provides additional traffic filtering directly on endpoint devices, thereby offering another layer of defense against potential threats. Which technology must be implemented to meet the requirement?

Options:

A.

host-based firewall

B.

web application firewall

C.

distributed firewall

D.

traditional firewall

Buy Now
Questions 8

Refer to the exhibit.

In addition to SSL decryption, which firewall feature allows malware to be blocked?

Options:

A.

DLP

B.

SSL Offloading

C.

URL Filtering

D.

File Inspection

Buy Now
Questions 9

A developer company recently implemented a testing environment based on Linux operating system. The company needs a technology solution that produces tracing and filtering capabilities in the Linux kernel. Which technology meets these requirements without modifying the kernel source code?

Options:

A.

eBPF

B.

distributed firewall

C.

NGFW

D.

VPP

Buy Now
Questions 10

A legal services company wants to prevent remote employees from accessing personal email and social media accounts while using corporate laptops. Which security solution enforces the policy?

Options:

A.

Cisco TrustSec

B.

RADIUS server

C.

Cisco Umbrella

D.

network monitoring tool

Buy Now
Questions 11

Which financial reporting regulatory framework must a publicly traded company doing business in the US comply with?

Options:

A.

HIPAA

B.

SOX

C.

SOC

D.

FEDRAMP

Buy Now
Questions 12

Which tool is used by a SOC analyst to quarantine an endpoint?

Options:

A.

flow collector

B.

syslog

C.

load balancer

D.

Cisco XDR

Buy Now
Questions 13

How is generative AI used in securing networks?

Options:

A.

to provide real-time load balancing

B.

to improve resource consumption

C.

to perform real-time audits to ensure regulatory compliance

D.

to detect unusual patterns in network traffic

Buy Now
Questions 14

A company published software that had a security vulnerability, and an attacker used the vulnerability to steal critical information from the environment. The issue was reported by the security team, and the administrator was instructed to run shift-left security tests before publishing the software. Which component of the software development pipeline must be recommended to run the tests?

Options:

A.

continuous deployment

B.

cloud security posture management

C.

software bill of material analysis

D.

source code management

Buy Now
Questions 15

Which tool must be used to prioritize incidents by a SOC?

Options:

A.

SIEM

B.

endpoint detection and response

C.

CloudWatch

D.

endpoint protection platform

Buy Now
Questions 16

Employees in a healthcare organization could not access their devices when they returned to work after the weekend. The security team discovered that a threat actor had encrypted the devices. Which security solution would mitigate the risk in future?

Options:

A.

password policy enforcement

B.

network configuration management

C.

data loss prevention

D.

endpoint detection and response

Buy Now
Questions 17

Considering recent cybersecurity threats, a company wants to improve the process for identifying, assessing, and managing risks with a comprehensive and holistic approach. Which framework must be used to meet these requirements?

Options:

A.

HIPPA

B.

MITRE CAPEC

C.

NIST SP 800-37

D.

GDPR

Buy Now
Exam Code: 300-745
Exam Name: Designing Cisco Security Infrastructure (300-745 SDSI) v1.0
Last Update: Feb 28, 2026
Questions: 57
300-745 pdf

300-745 PDF

$28.5  $94.99
300-745 Engine

300-745 Testing Engine

$33  $109.99
300-745 PDF + Engine

300-745 PDF + Testing Engine

$43.5  $144.99