Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cisco 300-740 Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Exam Practice Test

Page: 1 / 6
Total 61 questions

Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers

Question 1

Question # 1

Refer to the exhibit. An engineer must analyze the Cisco Secure Cloud Analytics report. What is occurring?

Options:

A.

Persistent remote-control connections

B.

Distributed DDoS attack

C.

Geographically unusual remote access

D.

Memory exhaustion attempt toward port 22

Question 2

Question # 2

Question # 2

Refer to the exhibit. An engineer is investigating an issue by using Cisco Secure Cloud Analytics. The engineer confirms that the connections are unauthorized and informs the incident management team. Which two actions must be taken next? (Choose two.)

Options:

A.

Reinstall the host from a recent backup.

B.

Quarantine the host

C.

Reinstall the host from scratch.

D.

Create a firewall rule that has a source of linux-gcp-east-4c, a destination of Any, and a protocol of SSH.

E.

Create a firewall rule that has a source of Any, a destination of linux-gcp-east-4c, and a protocol of SSH.

Question 3

Which common strategy should be used to mitigate directory traversal attacks in a cloud environment?

Options:

A.

Use anti-cross-site request forgery tokens.

B.

Apply the principle of least privilege.

C.

Implement functionality validation.

D.

Limit file system permissions.

Question 4

Question # 4

Refer to the exhibit. A security engineer must configure a posture policy in Cisco ISE to ensure that employee laptops have a critical patch for WannaCry installed before they can access the network. Which posture condition must the engineer configure?

Options:

A.

Patch Management Condition

B.

File Condition

C.

Anti-Virus Condition

D.

Anti-Malware Condition

Question 5

Question # 5

Refer to the exhibit. An engineer must block internal users from accessing Facebook and Facebook Apps. All other access must be allowed. The indicated policy was created in Cisco Secure Firewall Management Center and deployed to the internet edge firewall; however, users still can access Facebook. Which two actions must be taken to meet the requirement? (Choose two.)

Options:

A.

Set Destination Zones to outside for rule 2.

B.

Set Source Zones to inside for rule 2.

C.

Set Applications to Facebook and Facebook Apps for rule 2.

D.

Set Destination Zones to outside for rule 1.

E.

Set Source Zones to inside for rule 1.

Question 6

What is a crucial component in the MITRE ATT&CK framework?

Options:

A.

Techniques for accessing credentials

B.

Incident response workflow

C.

Blueprint for a secure network architecture

D.

Best practices for user access management

Question 7

Which method is used by a Cisco XDR solution to prioritize actions?

Options:

A.

Updating antivirus signatures

B.

Monitoring endpoint activity

C.

Leveraging AI and machine learning

D.

Analyzing network traffic patterns

Question 8

Question # 8

Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv1 VPN that will use AES256 and SHA256 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the tunnel fails to establish. Which two IKEv1 policy commands must be run to meet the requirement? (Choose two.)

Options:

A.

encryption aes-256

B.

ipsec-proposal sha-256-aes-256

C.

integrity aes-256

D.

ipsec-proposal AES256-SHA256

E.

hash sha-256

Question 9

A network administrator uses Cisco Umbrella to protect internal users from malicious content. A customer is using an IPsec tunnel to connect to an Umbrella Organization. The administrator was informed about a zero-day vulnerability that infects user machines and uploads sensitive data through the RDP port. The administrator must ensure that no users are connected to the internet using the RDP protocol. Which Umbrella configuration must the administrator apply?

Options:

A.

Web policy to block Remote Desktop Manager application type

B.

Firewall policy and set port 3389 to be blocked for all outgoing traffic

C.

Data loss prevention policy to block all file uploads with RDP application mime type

D.

DNS policy to block Remote Desktop Manager application type

Question 10

Question # 10

Refer to the exhibit. An engineer must configure multifactor authentication using the Duo Mobile app to provide admin access to a Cisco Meraki switch. The engineer already configured Duo Mobile and received an activation code. Drag and drop the steps from left to right to complete the configuration.

Question # 10

Options:

Question 11

Which concept is used in the Cisco SAFE key reference model?

Options:

A.

Secure Domains

B.

Cloud Edge

C.

Security Intelligence

D.

Threat Defense

Question 12

An engineer configures trusted endpoints with Active Directory with Device Health to determine if an endpoint complies with the policy posture. After a week, an alert is received by one user, reporting problems accessing an application. When the engineer verifies the authentication report, this error is found:

"Endpoint is not trusted because Cisco Secure Endpoint check failed, Check user's endpoint in Cisco Secure Endpoint."

Which action must the engineer take to permit access to the application again?

Options:

A.

Verify the Cisco Secure Endpoint admin panel and approve the access to the user on the Management tab after a complete virus check of the user's laptop.

B.

Verify the Trusted Endpoints policy to verify the status of the machine, and after a complete process of analysis, permit the machine to have access to the application.

C.

Verify the Duo admin panel, check the EndPoints tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

D.

Verify the Cisco Secure Endpoint admin panel, check the Inbox tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

Question 13

Question # 13

Refer to the exhibit. An engineer must configure Cisco ASA so that the Secure Client deployment is removed when the user laptop disconnects from the VPN. The indicated configuration was applied to the Cisco ASA firewall. Which command must be run to meet the requirement?

Options:

A.

client-bypass-protocol enable

B.

anyconnect keep-installer none

C.

anyconnect firewall-rule client-interface

D.

D. client-bypass-protocol disable

Question 14

Question # 14

Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed. What should be done to meet the requirement?

Options:

A.

Change consumer_filter_ref to HTTP Consumer.

B.

Add HTTP to 14_params.

C.

Decrease the priority of the template to 50.

D.

Increase the priority of the template to 200.

Question 15

Question # 15

Refer to the exhibit. An engineer must configure Duo SSO for Cisco Webex and add the Webex application to the Duo Access Gateway. Which two actions must be taken in Duo? (Choose two.)

Options:

A.

Upload the application XML metadata file.

B.

Upload the SAML application JSON file.

C.

Configure the Applications settings for Cisco Webex.

D.

Import the Identity Provider metadata.

E.

Add a new application to the Duo platform.

Question 16

According to Cisco Security Reference Architecture, which solution provides threat intelligence and malware analytics?

Options:

A.

Cisco pxGrid

B.

Cisco XDR

C.

Cisco Talos

D.

Cisco Umbrella

Question 17

In the zero-trust network access model, which criteria is used for continuous verification to modify trust levels?

Options:

A.

System patching status

B.

Detected threat levels

C.

User and device behavior

D.

Network traffic patterns

Question 18

Question # 18

Refer to the exhibit. An engineer must configure SAML SSO in Cisco ISE to use Microsoft Azure AD as an identity provider. These configurations were performed:

    Configure a SAML IdP in ISE.

    Configure the Azure AD IdP settings.

Which two actions must the engineer take in Cisco ISE? (Choose two.)

Options:

A.

Add a SAML IdP.

B.

Upload metadata from Azure AD to ISE.

C.

Configure SAML groups in ISE.

D.

Configure the External Identity Sources settings.

E.

Configure the Internal Identity Source Sequence setting.

Page: 1 / 6
Total 61 questions