Pre-Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

300-745 Sample Questions Answers

Questions 4

A security engineer on an application design team must choose a framework of attack patterns to evaluate during threat modeling. Which framework provides the common set of attacks?

Options:

A.

Cisco SAFE

B.

GDPR

C.

MITRE CAPEC

D.

SOC2

Buy Now
Questions 5

A company recently discovered that a former employee, who left to join a competitor, continued to access and exfiltrate sensitive data over several weeks after leaving. The breach highlighted vulnerabilities in the organization’s data security and access management practices. To prevent such incidents in the future, the organization must adopt measures that detect and restrict unauthorized data access and transfer. Which mitigation strategy must be implemented to address the issue?

Options:

A.

Implement web application firewall.

B.

Upgrade network policy access.

C.

Implement data loss prevention strategy.

D.

Deploy audit logging and monitoring solution.

Buy Now
Questions 6

What is a use for AI in securing network infrastructure?

Options:

A.

known day zero attack detection

B.

load balancing

C.

traffic shaping

D.

quality of service

Buy Now
Questions 7

An employee of a pharmaceutical company accidentally checked in code that contains AWS secret keys to a public GitHub repository, which exposes production resources to attackers. Which mitigation strategy must a security engineer recommend to prevent future reoccurrence?

Options:

A.

Add a web application firewall.

B.

Implement a more granular port security strategy.

C.

Implement a phishing education campaign.

D.

Configure a SCM precommit hook.

Buy Now
Questions 8

After a recent security breach, a financial company is reassessing their overall security posture and strategy to better protect sensitive data and resources. The company already deployed on-premises next-generation firewalls at the network edge for each branch location. Security measures must be enhanced at the endpoint level. The goal is to implement a solution that provides additional traffic filtering directly on endpoint devices, thereby offering another layer of defense against potential threats. Which technology must be implemented to meet the requirement?

Options:

A.

host-based firewall

B.

web application firewall

C.

distributed firewall

D.

traditional firewall

Buy Now
Questions 9

A global marketing firm, based in California with customers on every continent, suffered a data breach that exposed employee and customer PII. Which regulations is the company in danger of violating?

Options:

A.

ISO SP800-53

B.

FedRamp

C.

GDPR

D.

ISO27001

Buy Now
Questions 10

A construction company recently introduced a BYOD policy, where contractors can bring personal devices and connect to the wireless network. The network engineer configured a Wi-Fi network with a guest splash page to provide internet access only. Although the policy was limited to wireless devices, contractors started bringing devices that needed wired connections without authorization and connecting to the network. The network team suggested shutting down ports where unauthorized devices are connected. Which technology must be implemented to ensure that wired and wireless devices are granted network access only after successful authentication?

Options:

A.

VxLANs

B.

private VLANs

C.

VACLs

D.

802.1x

Buy Now
Questions 11

A technology company has many remote workers who access corporate resources from various locations. The company must ensure that security policies are managed and enforced directly on endpoints, and endpoints are protected from threats regardless of location. Which firewall architecture meets the requirements?

Options:

A.

next-generation firewall

B.

host-based firewall

C.

web application firewall

D.

traditional firewall

Buy Now
Questions 12

In preparation for an upcoming security audit, a metal production company decided to enhance the security of container-based services running in a Kubernetes environment. The company wants to ensure that all communications between applications and services are encrypted. The administrator plans to implement mTLS service between application and services to secure the data exchanges. Given the need to manage encryption at scale and maintain efficient communication across the cluster, which network transport technology must be employed?

Options:

A.

ingress controller

B.

load balancing

C.

Kubernetes network policies

D.

Service Mesh

Buy Now
Questions 13

A global hotel chain is using Cisco ISE and Cisco switches to manage the network. The hotel company wants to enhance network security by segmenting users and endpoints. The company must ensure that devices within the same VLAN cannot communicate with each other. The goal is to prevent cross-communication without the use of dynamic access control lists. Which action must be taken using Cisco ISE to meet the requirement?

Options:

A.

Implement device posturing.

B.

Set up endpoint profiling.

C.

Enable identity groups.

D.

Configure TrustSec.

Buy Now
Questions 14

A telecommunications company recently introduced a hybrid working model. Based on the new policy, employees can work remotely for 2 days per week if corporate equipment is used. The IT department is preparing corporate laptops to support users during the remote working days. Which solution must the IT department implement that provides secure connectivity to corporate resources and protects sensitive corporate data even if a laptop is stolen?

Options:

A.

Secure Client

B.

Cisco Duo

C.

ISE Posture

D.

Umbrella

Buy Now
Questions 15

An agricultural company wants to enhance the cybersecurity posture by implementing a defense-in-depth strategy to protect against polymorphic malware threats. Currently, the company’s security infrastructure relies solely on a stateful traditional edge firewall that does not provide adequate protection against malware variants. Which technology must be added to the company’s security architecture to achieve the goal?

Options:

A.

web application firewall

B.

physical security control

C.

network performance monitor

D.

heuristics-based IPS

Buy Now
Questions 16

A bank experienced challenges with compromised endpoints gaining access to the internal network. To enhance security, the bank wants to ensure that all endpoints are scanned for compliance checks before being allowed to access the network. Which action achieves the level of security and control?

Options:

A.

Use MFA using Cisco DUO.

B.

Configure TrustSec using Cisco ISE.

C.

Set up data loss prevention policy.

D.

Implement Posture validation using Cisco ISE.

Buy Now
Questions 17

A software development company relies on GitHub for managing the source code and is committed to maintaining application security. The company must ensure that known software vulnerabilities are not introduced to the application. The company needs a capability within GitHub that can analyze semantic versioning and flag any software components that pose security risks. Which GitHub feature must be used?

Options:

A.

Depend-a-bot

B.

Sealed boxes

C.

GitHub Actions

D.

Artifact attestations

Buy Now
Exam Code: 300-745
Exam Name: Designing Cisco Security Infrastructure (300-745 SDSI) v1.0
Last Update: Apr 12, 2026
Questions: 58
$61.25  $174.99
$47.25  $134.99
$40.25  $114.99
buy now 300-745