A legal services company wants to prevent remote employees from accessing personal email and social media accounts while using corporate laptops. Which security solution enforces the policy?
A. Cisco TrustSec
B. RADIUS server
C. Cisco Umbrella
D. network monitoring tool
A software development company relies on GitHub for managing the source code and is committed to maintaining application security. The company must ensure that known software vulnerabilities are not introduced to the application. The company needs a capability within GitHub that can analyze semantic versioning and flag any software components that pose security risks. Which GitHub feature must be used?
A. Depend-a-bot
B. Sealed boxes
C. GitHub Actions
D. Artifact attestations
An oil and gas company recently faced a security breach when an employee’s notepad, which contained critical login credentials, was stolen. The incident led to unauthorized access to a user account, which posed a significant risk to sensitive company data and operations. The company wants to adopt a security measure that enhances user account protection. Which action must be taken to prevent breaches like this from happening in the future?
A. Implement MFA
B. Implement single sign-on.
C. Update the RADIUS server.
D. Configure a password expiration policy.
A retail company is facing a series of cyberattacks targeting web servers, which results in disruptions to online services. Upon investigation, the security team identified that these attacks involved invalid HTTP request headers, which were used to exploit vulnerabilities in the web application. To safeguard the company websites against similar threats in the future, the security team must deploy a security solution specifically designed to detect and block such malicious web traffic. Which security product must be used to protect the websites from similar attacks?
A. antivirus software
B. traditional firewall
C. web application firewall
D. host-based firewall
A manufacturing company experienced a security breach that resulted in sales data being compromised. An engineer participating in the investigation must identify who logged into the sales system during the affected period. Which approach must be used to gather the information?
A. SNMP
B. NACM
C. AAA
D. PKI
Refer to the exhibit.

A retail company recently deployed a file inspection feature using secure endpoint. The file
inspection must detect and prevent the execution of malicious files on machines. During
testing, logs showed that certain malicious files are still being executed despite the
presence of the security measure. To understand why the threats are not being blocked, it
is essential to investigate the configuration of secure endpoint policies. Which configuration
is allowing the files to execute?
A. Files are not malicious.
B. Policy must block the network connections.
C. Policy rule is disabled.
D. Policy rule is in audit mode.
A video game company identified a potential threat of a SYN flood attack, which could disrupt the online gaming services and impact user experience. The attack can overwhelm network resources by exploiting the TCP handshake process, leading to server unavailability and degraded performance. To safeguard the company's infrastructure and ensure uninterrupted service, it is essential to enhance the security measures in place. The company must implement a solution that manages and mitigates the risk of such networkbased attacks. Which security product must be implemented to mitigate similar risks?
A. Cisco Web Security Appliance
B. Cisco Umbrella
C. Cisco Secure Endpoint
D. Cisco Secure Firewall
After deploying a new API, the security team must identify the components of the application that are exposed to the internet and whether there are application authentication risks. Which technology must be deployed to discover the applications services and monitor for authentication issues?
A. Cloud Security Posture Management
B. API trace analysis
C. secret scanning
D. Cloud Workload Protection
A pharmaceutical company needs a hub-and-spoke VPN topology. The design must be capable of building either partial or full mesh overlay networks. Which VPN solution must be implemented in the environment?
A. DMVPN
B. L2TP
C. crypto maps
D. SSL VPN
Which financial reporting regulatory framework must a publicly traded company doing business in the US comply with?
A. HIPAA
B. SOX
C. SOC
D. FEDRAMP
A global energy company moved a monolithic application from the data center to public cloud. Over time, the company added many capabilities to the application, and it is now difficult for the application team to scale it. The application owner decided to modernize the application by moving to a Kubernetes cluster. However, he wants to ensure that the new application architecture provides a container network interface that is scalable, offers options for cloud-native security, and helps with visibility and observability. Which solution must be used to accomplish the task?
A. security group
B. Cilium
C. ENI
D. ingress gateway
How does a SOC leverage flow collectors?
A. It performs data backup and recovery.
B. It performs load balancing capabilities across systems to optimize performance.
C. It provides data for analysis in threat detection and response system.
D. It provides real-time content filtering.
| Page 1 out of 5 Pages |
| 12 |
Real-World Scenario Mastery: Our 300-745 practice exam don't just test definitions. They present you with the same complex, scenario-based problems you'll encounter on the actual exam.
Strategic Weakness Identification: Each practice session reveals exactly where you stand. Discover which domains need more attention, before Designing Cisco Security Infrastructure (300-745 SDSI) v1.0 exam day arrives.
Confidence Through Familiarity: There's no substitute for knowing what to expect. When you've worked through our comprehensive 300-745 practice exam questions pool covering all topics, the real exam feels like just another practice session.