Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Cisco 300-740 Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Exam Practice Test

Demo: 18 questions
Total 61 questions

Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers

Question 1

Refer to the exhibit. An engineer must create a firewall policy to allow web server communication only. The indicated firewall policy was applied; however, a recent audit requires that all firewall policies be optimized. Which set of rules must be deleted?

Options:

A.

Rules 3 and 4

B.

Rules 2 to 4

C.

Rules 2 to 5

D.

Rules 1 and 5

Question 2

Drag and drop the five core functions from the left into the order defined by the NIST Cyber security Framework on the right.

Options:

Question 3

An administrator received an incident report indicating suspicious activity of a user using a corporate device. The manager requested that the credentials of user user1@cisco.com be reset and synced via the Active Directory. Removing the account should be avoided and used for further investigation on data leak. Which configuration must the administrator apply on the Duo Admin Panel?

Options:

A.

Delete the user in the Users tab option and sync it with the domain controller.

B.

Quarantine the user from all the policies on the Policies tab, including associated devices.

C.

Request the password change on the Device tab on managed devices.

D.

Disable the account on the Users tab and reset the password from the Active Directory.

Question 4

Refer to the exhibit. An engineer must provide HTTPS access from the Google Cloud Platform virtual machine to the on-premises mail server. All other connections from the virtual machine to the mail server must be blocked. The indicated rules were applied to the firewall; however, the virtual machine cannot access the mail server. Which two actions should be performed on the firewall to meet the requirement? (Choose two.)

Options:

A.

Set IP address 192.168.200.10 as the destination in rule 1.

B.

Move up rule 2.

C.

Set IP address 20.1.1.1 as the source in rule 1.

D.

Configure a NAT rule.

E.

Configure a security group.

Question 5

A network administrator uses Cisco Umbrella to protect internal users from malicious content. A customer is using an IPsec tunnel to connect to an Umbrella Organization. The administrator was informed about a zero-day vulnerability that infects user machines and uploads sensitive data through the RDP port. The administrator must ensure that no users are connected to the internet using the RDP protocol. Which Umbrella configuration must the administrator apply?

Options:

A.

Web policy to block Remote Desktop Manager application type

B.

Firewall policy and set port 3389 to be blocked for all outgoing traffic

C.

Data loss prevention policy to block all file uploads with RDP application mime type

D.

DNS policy to block Remote Desktop Manager application type

Question 6

Which mitigation technique does a web application firewall use to protect a web server against DDoS attacks?

Options:

A.

Source-specific ACL

B.

Standard ACL

C.

Packet filtering

D.

Rate-based rules

Question 7

Which web application firewall deployment in the Cisco Secure DDoS protects against application layer and volumetric attacks?

Options:

A.

Hybrid

B.

On-demand

C.

Always-on

D.

Active/passive

Question 8

An organization is distributed across several sites. Each site is connected to the main HQ using site-to-site VPNs implemented using Secure Firewall Threat Defense. Which functionality must be implemented if the security manager wants to send SaaS traffic directly to the internet?

Options:

A.

Multi-instances

B.

IPsec tunnels

C.

Policy-based routing

D.

ECMP routing

Question 9

Refer to the exhibit. An engineer is troubleshooting an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

Options:

A.

An attacker installed an SSH server on the host.

B.

An attacker opened port 22 on the host.

C.

An FTP client was installed on a domain controller.

D.

An FTP client was installed on a workstation.

Question 10

Which concept is used in the Cisco SAFE key reference model?

Options:

A.

Secure Domains

B.

Cloud Edge

C.

Security Intelligence

D.

Threat Defense

Question 11

Refer to the exhibit. A security engineer deployed Cisco Secure XDR, and during testing, the log entry shows a security incident. Which action must the engineer take first?

Options:

A.

Uninstall the malware.

B.

Block IP address 10.77.17.45.

C.

Isolate the endpoint.

D.

Rebuild the endpoint.

Question 12

Refer to the exhibit. An engineer must enable access to Salesforce using Cisco Umbrella and Cisco Cloudlock. These actions were performed:

    From Salesforce, add the Cloudlock IP address to the allow list

    From Cloudlock, authorize Salesforce

However, Salesforce access via Cloudlock is still unauthorized. What should be done to meet the requirements?

Options:

A.

From the Salesforce admin page, grant API access to Cloudlock.

B.

From the Salesforce admin page, grant network access to Cloudlock

C.

From the Cloudlock dashboard, grant API access to Salesforce.

D.

From the Cloudlock dashboard, grant network access to Salesforce.

Question 13

Refer to the exhibit. An engineer must configure Cisco ASA so that the Secure Client deployment is removed when the user laptop disconnects from the VPN. The indicated configuration was applied to the Cisco ASA firewall. Which command must be run to meet the requirement?

Options:

A.

client-bypass-protocol enable

B.

anyconnect keep-installer none

C.

anyconnect firewall-rule client-interface

D.

D. client-bypass-protocol disable

Question 14

Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv1 VPN that will use AES256 and SHA256 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the tunnel fails to establish. Which two IKEv1 policy commands must be run to meet the requirement? (Choose two.)

Options:

A.

encryption aes-256

B.

ipsec-proposal sha-256-aes-256

C.

integrity aes-256

D.

ipsec-proposal AES256-SHA256

E.

hash sha-256

Question 15

An engineer is configuring multifactor authentication using Duo. The implementation must use Duo Authentication Proxy and the Active Directory as an identity source. The company uses Azure and a local Active Directory. Which configuration is needed to meet the requirement?

Options:

A.

Configure the Identity Source as "SAML" on the Single Sign-On tab in the Duo Admin Panel, and configure the forwarding proxy as "local" for the Identity Source.

B.

Configure the Identity Source as "SAML" on the Single Sign-On tab, and configure the authentication proxy with the "[cloud]" section.

C.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab in the Duo Admin Panel, and configure the permit list to "Local database".

D.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab, and configure the authentication proxy with the "[sso]" section.

Question 16

Refer to the exhibit. A security engineer must configure a posture policy in Cisco ISE to ensure that employee laptops have a critical patch for WannaCry installed before they can access the network. Which posture condition must the engineer configure?

Options:

A.

Patch Management Condition

B.

File Condition

C.

Anti-Virus Condition

D.

Anti-Malware Condition

Question 17

Refer to the exhibit. An engineer must configure a global allow list in Cisco Umbrella for the cisco.com domain. All other domains must be blocked. After creating a new policy and adding the cisco.com domain, the engineer attempts to access a site outside of cisco.com and is successful. Which additional Security Settings action must be taken to meet the requirement?

Options:

A.

Limit Content Access.

B.

Enforce SafeSearch.

C.

Enable Allow-Only Mode

D.

Apply Destination List.

Question 18

Which attack mitigation must be in place to prevent an attacker from authenticating to a service using a brute force attack?

Options:

A.

Forced password change every 6 months

B.

Use of a 100 ms delay between each authentication

C.

Use of a password manager

D.

Use of multifactor authentication for all accounts

Demo: 18 questions
Total 61 questions