Designing Cisco Security Infrastructure

Here you have the best Cisco 300-745 practice exam questions

  • You have 61 total questions to study from
  • Each page has 5 questions, making a total of 13 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on February 3, 2026
  • This site is not affiliated with or endorsed by Cisco.
Question 1 of 61
A restaurant distribution center recently suffered a password spray attack targeting the Cisco Secure Firepower Threat Defense VPN headend. The attack attempts to gain unauthorized access by trying common passwords across many accounts. The attack poses a significant security threat to the organization’s remote access infrastructure. To enhance the security of VPN setup and minimize the risk of similar attacks in the future, the IT security team must implement effective mitigation measures. Which technique effectively reduces the risk of this type of attack?
Suggested Answer: D

Community votes

No votes yet

Question 2 of 61
A software development company uses multiple cloud providers to host the applications. The company is designing a scalable firewall solution that must meet the requirements:
Consistent security policies across multiple cloud environments.
Centralized visibility and management.
Scalability to accommodate different cloud platforms.
Which type of firewall meets the requirements?
Suggested Answer: C

Community votes

No votes yet

Question 3 of 61
A video game company identified a potential threat of a SYN flood attack, which could disrupt the online gaming services and impact user experience. The attack can overwhelm network resources by exploiting the TCP handshake process, leading to server unavailability and degraded performance. To safeguard the company's infrastructure and ensure uninterrupted service, it is essential to enhance the security measures in place. The company must implement a solution that manages and mitigates the risk of such network-based attacks. Which security product must be implemented to mitigate similar risks?
Suggested Answer: D

Community votes

No votes yet

Question 4 of 61
A legal services company wants to prevent remote employees from accessing personal email and social media accounts while using corporate laptops. Which security solution enforces the policy?
Suggested Answer: C

Community votes

No votes yet

Question 5 of 61
A developer company recently made a contract with new customer in the financial space. The customer has multiple remote sites and requires a VPN solution with the highest encryption. Which protocol must be used in IPsec Phase 2?
Suggested Answer: A

Community votes

No votes yet