Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

300-740 Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers

Questions 4

An organization is distributed across several sites. Each site is connected to the main HQ using site-to-site VPNs implemented using Secure Firewall Threat Defense. Which functionality must be implemented if the security manager wants to send SaaS traffic directly to the internet?

Options:

A.

Multi-instances

B.

IPsec tunnels

C.

Policy-based routing

D.

ECMP routing

Buy Now
Questions 5

Refer to the exhibit. An engineer must enable access to Salesforce using Cisco Umbrella and Cisco Cloudlock. These actions were performed:

    From Salesforce, add the Cloudlock IP address to the allow list

    From Cloudlock, authorize Salesforce

However, Salesforce access via Cloudlock is still unauthorized. What should be done to meet the requirements?

Options:

A.

From the Salesforce admin page, grant API access to Cloudlock.

B.

From the Salesforce admin page, grant network access to Cloudlock

C.

From the Cloudlock dashboard, grant API access to Salesforce.

D.

From the Cloudlock dashboard, grant network access to Salesforce.

Buy Now
Questions 6

What does the MITRE ATT&CK framework catalog?

Options:

A.

Techniques utilized in cyber attacks

B.

Patterns of system vulnerabilities

C.

Models of threat intelligence sharing

D.

Standards for information security management

Buy Now
Questions 7

An engineer configures trusted endpoints with Active Directory with Device Health to determine if an endpoint complies with the policy posture. After a week, an alert is received by one user, reporting problems accessing an application. When the engineer verifies the authentication report, this error is found:

"Endpoint is not trusted because Cisco Secure Endpoint check failed, Check user's endpoint in Cisco Secure Endpoint."

Which action must the engineer take to permit access to the application again?

Options:

A.

Verify the Cisco Secure Endpoint admin panel and approve the access to the user on the Management tab after a complete virus check of the user's laptop.

B.

Verify the Trusted Endpoints policy to verify the status of the machine, and after a complete process of analysis, permit the machine to have access to the application.

C.

Verify the Duo admin panel, check the EndPoints tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

D.

Verify the Cisco Secure Endpoint admin panel, check the Inbox tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

Buy Now
Questions 8

What must be automated to enhance the efficiency of a security team response?

Options:

A.

Changing all user passwords when a threat is detected

B.

Changing firewall settings for every detected threat, regardless of its severity

C.

Isolating affected systems and applying predefined security policies

D.

Sending an email to the entire organization when a threat is detected

Buy Now
Questions 9

What helps prevent drive-by compromise?

Options:

A.

Ad blockers

B.

VPN

C.

Incognito browsing

D.

Browsing known websites

Buy Now
Questions 10

An administrator received an incident report indicating suspicious activity of a user using a corporate device. The manager requested that the credentials of user user1@cisco.com be reset and synced via the Active Directory. Removing the account should be avoided and used for further investigation on data leak. Which configuration must the administrator apply on the Duo Admin Panel?

Options:

A.

Delete the user in the Users tab option and sync it with the domain controller.

B.

Quarantine the user from all the policies on the Policies tab, including associated devices.

C.

Request the password change on the Device tab on managed devices.

D.

Disable the account on the Users tab and reset the password from the Active Directory.

Buy Now
Questions 11

Refer to the exhibit. An engineer must create a firewall policy to allow web server communication only. The indicated firewall policy was applied; however, a recent audit requires that all firewall policies be optimized. Which set of rules must be deleted?

Options:

A.

Rules 3 and 4

B.

Rules 2 to 4

C.

Rules 2 to 5

D.

Rules 1 and 5

Buy Now
Questions 12

Refer to the exhibit. An engineer must block internal users from accessing Facebook and Facebook Apps. All other access must be allowed. The indicated policy was created in Cisco Secure Firewall Management Center and deployed to the internet edge firewall; however, users still can access Facebook. Which two actions must be taken to meet the requirement? (Choose two.)

Options:

A.

Set Destination Zones to outside for rule 2.

B.

Set Source Zones to inside for rule 2.

C.

Set Applications to Facebook and Facebook Apps for rule 2.

D.

Set Destination Zones to outside for rule 1.

E.

Set Source Zones to inside for rule 1.

Buy Now
Questions 13

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

Options:

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

Buy Now
Questions 14

Refer to the exhibit. An engineer must troubleshoot an issue with excessive SSH traffic leaving the internal network between the hours of 18:00 and 08:00. The engineer applies a policy to the Cisco ASA firewall to block outbound SSH during the indicated hours; however, the issue persists. What should be done to meet the requirement?

Options:

A.

Change the time of rule 2.

B.

Delete rule 4

C.

Delete rule 3

D.

Change the time of rule 5

Buy Now
Questions 15

Refer to the exhibit. An engineer must create a policy in Cisco Secure Firewall Management Center to prevent restricted users from being able to browse any business or mobile phone shopping websites. The indicated policy was applied; however, the restricted users still can browse on the mobile phone shopping websites during business hours. What should be done to meet the requirement?

Options:

A.

Set Dest Zones to Business Mobile Phones Shopping.

B.

Set Dest Networks to Business Mobile Phones Shopping.

C.

Set Time Range for rule 4 of Access Controlled Groups to All.

D.

Move rule 4 Access Controlled Groups to the top.

Buy Now
Questions 16

Refer to the exhibit. An engineer configured a default segmentation policy in Cisco Secure Workload to block SMTP traffic. During testing, it is observed that the SMTP traffic is still allowed. Which action must the engineer take to complete the configuration?

Options:

A.

Add "port": [25, 25] to _rootScope

B.

Add _SMTPScope to provider_filter_ref

C.

Add "port": [25, 25] to _params

D.

Change consumer_filter_ref to: _SMTPScope

Buy Now
Questions 17

Refer to the exhibit. An engineer must connect an on-premises network to the public cloud using Cisco Umbrella as a Cloud Access Security Broker. The indicated configuration was applied to router R1; however, connectivity to Umbrella fails with this error: %OPENDNS-3-DNS_RES_FAILURE. Which action must be taken on R1 to enable the connection?

Options:

A.

Configure the Open DNS servers with the ip name-server command.

B.

Configure a DHCP scope using the ip dhcp pool command.

C.

Add the opendns in command to the interface configuration.

D.

Add the opendns out command to the interface configuration.

Buy Now
Questions 18

Refer to the exhibit. An engineer must troubleshoot an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

Options:

A.

SYN flood attack toward the DNS server that has IP address 10.10.10.10

B.

DoS attack toward the 50.10.10.0/24 network from an internal IP address

C.

Ping of Death attack toward the host that has IP address 10.10.10.10

D.

TCP fingerprinting toward the 50.10.10.0/24 network

Buy Now
Exam Code: 300-740
Exam Name: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
Last Update: Aug 17, 2025
Questions: 61
300-740 pdf

300-740 PDF

$33.25  $94.99
300-740 Engine

300-740 Testing Engine

$38.5  $109.99
300-740 PDF + Engine

300-740 PDF + Testing Engine

$50.75  $144.99