Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 300-745 Practice Exam with Questions & Answers

Questions 1

A financial company is focused on proactively protecting sensitive data stored on the devices. The company recognizes the potential risks associated with lost or stolen devices and they want a solution to ensure that if unauthorized user access the device, the data it contains is not accessible or misused. The solution includes implementing a strategy that renders data unreadable without user authentication. Which solution meets the requirement?

Options:
A.

Install Kensington Lock.

B.

Use a BIOS password.

C.

Implement data encryption on disk.

D.

Apply GPS tracking.

Cisco 300-745 Premium Access
Questions 2

A financial company uses a remote access solution that directs all traffic over a secure tunnel. The company recently received some large ISP bills from the headquarter location. According to traffic analysis during the investigation, most of the network traffic was due to employees spending a lot of time on video conferences provided by a SaaS collaboration company. What must the company modify to reduce the cost without negatively impacting security or employee experience?

Options:
A.

Reduce the video resolution size permitted within the SaaS application.

B.

Split-exclude the video SaaS application from the VPN.

C.

Block the video conferencing app when connected on VPN.

D.

Suggest users to disconnect from the VPN when on video calls.

Questions 3

An IT company operates an application in a SaaS model. The administrative tasks, such as customer onboarding, within the application must be restricted to users who are on the corporate network where admins can access those functions via a web browser or a smartphone application. Which application technology must be used to provide granular control based on function?

Options:
A.

VPC

B.

RBAC

C.

security group

D.

Service Mesh

Questions 4

A manufacturing company implemented IoT devices throughout their smart factory and needs a security solution that meets these requirements:

    Protect IoT devices from network-based attacks.

    Visibility into communication patterns.

    Anomaly detection for IoT traffic.

Which firewall technology or feature should be recommended?

Options:
A.

zone-based firewall

B.

transparent firewall

C.

traditional firewall

D.

IPS/IDS

Questions 5

Refer to the exhibit.

300-745 Question 5

In addition to SSL decryption, which firewall feature allows malware to be blocked?

Options:
A.

DLP

B.

SSL Offloading

C.

URL Filtering

D.

File Inspection

Questions 6

A global hotel chain is using Cisco ISE and Cisco switches to manage the network. The hotel company wants to enhance network security by segmenting users and endpoints. The company must ensure that devices within the same VLAN cannot communicate with each other. The goal is to prevent cross-communication without the use of dynamic access control lists. Which action must be taken using Cisco ISE to meet the requirement?

Options:
A.

Implement device posturing.

B.

Set up endpoint profiling.

C.

Enable identity groups.

D.

Configure TrustSec.

Questions 7

After a recent security breach, a financial company is reassessing their overall security posture and strategy to better protect sensitive data and resources. The company already deployed on-premises next-generation firewalls at the network edge for each branch location. Security measures must be enhanced at the endpoint level. The goal is to implement a solution that provides additional traffic filtering directly on endpoint devices, thereby offering another layer of defense against potential threats. Which technology must be implemented to meet the requirement?

Options:
A.

host-based firewall

B.

web application firewall

C.

distributed firewall

D.

traditional firewall

Questions 8

An employee of a pharmaceutical company accidentally checked in code that contains AWS secret keys to a public GitHub repository, which exposes production resources to attackers. Which mitigation strategy must a security engineer recommend to prevent future reoccurrence?

Options:
A.

Add a web application firewall.

B.

Implement a more granular port security strategy.

C.

Implement a phishing education campaign.

D.

Configure a SCM precommit hook.

Questions 9

What does watermarking AI generated content prevent?

Options:
A.

massive resource consumption

B.

deep fakes

C.

harmful content

D.

scale changes

Questions 10

What is a use for AI in securing network infrastructure?

Options:
A.

known day zero attack detection

B.

load balancing

C.

traffic shaping

D.

quality of service

Exam Code: 300-745
Certification Provider: Cisco
Exam Name: Designing Cisco Security Infrastructure (300-745 SDSI) v1.0
Last Update: Apr 13, 2026
Questions: 58
PDF + Testing Engine
$174.99
$52.5
Testing Engine
$134.99
$40.5
PDF (Q&A)
$114.99
$34.5

Cisco Related Exams

How to pass Cisco 300-710 - Securing Networks with Cisco Firepower (300-710 SNCF) Exam
How to pass Cisco 300-715 - Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Exam
How to pass Cisco 300-720 - Securing Email with Cisco Email Security Appliance (300-720 SESA) Exam
How to pass Cisco 300-725 - Securing the Web with Cisco Web Security Appliance (300-725 SWSA) Exam
How to pass Cisco 300-730 - Implementing Secure Solutions with Virtual Private Networks (SVPN) Exam
How to pass Cisco 300-735 - Automating and Programming Cisco Security Solutions (300-735 SAUTO) Exam
How to pass Cisco 300-740 - Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Exam

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.