Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-745 Cisco Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Cisco 300-745 Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 57 questions

Considering recent cybersecurity threats, a company wants to improve the process for identifying, assessing, and managing risks with a comprehensive and holistic approach. Which framework must be used to meet these requirements?

A.

HIPPA

B.

MITRE CAPEC

C.

NIST SP 800-37

D.

GDPR

How does a SOC leverage flow collectors?

A.

It performs data backup and recovery.

B.

It performs load balancing capabilities across systems to optimize performance.

C.

It provides data for analysis in threat detection and response system.

D.

It provides real-time content filtering.

A developer company recently implemented a testing environment based on Linux operating system. The company needs a technology solution that produces tracing and filtering capabilities in the Linux kernel. Which technology meets these requirements without modifying the kernel source code?

A.

eBPF

B.

distributed firewall

C.

NGFW

D.

VPP

A technology company recently onboarded a new customer in the medical space. The customer needs a solution to provide data integrity across remote sites. Which solution must be used to meet this requirement?

A.

hashing

B.

data masking

C.

preshared key

D.

authentication

Which tool must be used to prioritize incidents by a SOC?

A.

SIEM

B.

endpoint detection and response

C.

CloudWatch

D.

endpoint protection platform

A company has been facing recurring issues with SQL injection vulnerabilities affecting the products, leading to significant disruptions for customers. To address the security concerns proactively, the company wants to integrate a tool into the CI/CD pipeline. The tool must be capable of identifying vulnerabilities such as SQL injection early in the development process, which allows developers to rectify issues before the code is deployed. Which solution must be implemented to meet the requirement?

A.

Static Application Security Testing tools, such as Checkmarx, Fortify, SonarQube

B.

build log observability tools, such as Splunk, Datadog

C.

workflow automation tools, such as GitHub Actions, Azure

D.

Dynamic Application Security Testing tools, such as OWASP ZAP, Veracode, Burp Suite

The network security team of a private university is conducting a comprehensive audit to evaluate the security posture across the network infrastructure. During the review, the security team found that a trusted vendor disclosed serious vulnerabilities identified in a product that plays a crucial role in the university’s CI/CD pipeline. The security team must act promptly to mitigate the potential risks posed by these vulnerabilities. Which action must the security team take first in response to the disclosure?

A.

Leverage IDS to measure the impact of the vulnerability.

B.

Notify customers of the impact and its source.

C.

Confirm impact by validating presence of the product in company’s environment.

D.

Patch the impacted product as soon as possible.

A manufacturing company experienced a security breach that resulted in sales data being compromised. An engineer participating in the investigation must identify who logged into the sales system during the affected period. Which approach must be used to gather the information?

A.

SNMP

B.

NACM

C.

AAA

D.

PKI

An administrator at a large university wants to ensure that the new employees have the right level of access when they are onboarded. The administrator asked the team to configure the cloud environment and ensure that new employees have the appropriate access based on their roles and responsibilities. Which technique must be recommended to ensure the right level of access?

A.

identity access management

B.

security groups

C.

VPN

D.

network access control list

A restaurant distribution center recently suffered a password spray attack targeting the Cisco Secure Firepower Threat Defense VPN headend. The attack attempts to gain unauthorized access by trying common passwords across many accounts. The attack poses a significant security threat to the organization’s remote access infrastructure. To enhance the security of the VPN setup and minimize the risk of similar attacks in the future, the IT security team must implement effective mitigation measures. Which technique effectively reduces the risk of this type of attack?

A.

Implement an access list to block addresses from the previous password spray attack.

B.

Disable group aliases in the connection profiles.

C.

Change the AAA authentication method from RADIUS to TACACS+.

D.

Enable AAA authentication for the DefaultWEBVPN and DefaultRAGroup Connection Profiles.

A global hotel chain is using Cisco ISE and Cisco switches to manage the network. The hotel company wants to enhance network security by segmenting users and endpoints. The company must ensure that devices within the same VLAN cannot communicate with each other. The goal is to prevent cross-communication without the use of dynamic access control lists. Which action must be taken using Cisco ISE to meet the requirement?

A.

Implement device posturing.

B.

Set up endpoint profiling.

C.

Enable identity groups.

D.

Configure TrustSec.

A financial company uses a remote access solution that directs all traffic over a secure tunnel. The company recently received some large ISP bills from the headquarter location. According to traffic analysis during the investigation, most of the network traffic was due to employees spending a lot of time on video conferences provided by a SaaS collaboration company. What must the company modify to reduce the cost without negatively impacting security or employee experience?

A.

Reduce the video resolution size permitted within the SaaS application.

B.

Split-exclude the video SaaS application from the VPN.

C.

Block the video conferencing app when connected on VPN.

D.

Suggest users to disconnect from the VPN when on video calls.

What is a use for AI in securing network infrastructure?

A.

known day zero attack detection

B.

load balancing

C.

traffic shaping

D.

quality of service

Which benefit does AI provide in network security?

A.

It speeds up network data transmission rates.

B.

It replaces comprehensive defense in depth.

C.

It provides complete protection from DDoS attacks.

D.

It identifies vulnerabilities associated with weak TLS algorithms.

A company hosted multiple applications in the Kubernetes environment, using the naming app01, app02, and so on. An app01 user could access app02 data because no security measures are implemented. The administrator decided to place each application within a separate namespace and ensure that the namespaces are completely isolated and cannot communicate with each other. Which solution must be used to accomplish the task?

A.

HTTPRoute

B.

RoleBinding

C.

NetworkPolicy

D.

Gateway

A manufacturing company recently experienced a network-down scenario due to malware spread on the management network. The company wants to implement a solution to detect and mitigate a similar threat in the future and protect the overall network. Which solution meets the requirements?

A.

endpoint detection and response

B.

RADIUS

C.

encrypted threat analysis

D.

IPsec VPN

Which tool is used to collect, analyze, and visualize logs from network devices, endpoints, and other sources in an enterprise?

A.

Cisco Email Security Appliance

B.

Cloud Observability

C.

Cisco Web Security Appliance

D.

Splunk

Page: 1 / 1
Total 57 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved