Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

300-740 Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers

Questions 4

What must be automated to enhance the efficiency of a security team response?

Options:

A.

Changing all user passwords when a threat is detected

B.

Changing firewall settings for every detected threat, regardless of its severity

C.

Isolating affected systems and applying predefined security policies

D.

Sending an email to the entire organization when a threat is detected

Buy Now
Questions 5

Refer to the exhibit. An engineer must analyze the Cisco Secure Cloud Analytics report. What is occurring?

Options:

A.

Persistent remote-control connections

B.

Distributed DDoS attack

C.

Geographically unusual remote access

D.

Memory exhaustion attempt toward port 22

Buy Now
Questions 6

Refer to the exhibit. An engineer must implement a remote access VPN solution that provides user and device verification. The company uses Active Directory for user authentication and ID certificates for device identity. Users are currently able to connect using only a valid username and password, even if their computer is missing the required certificate.

Which command from the Cisco ASA tunnel-group completes the requirement of verifying device identity in addition to user identity?

Options:

A.

ldap-attribute-map PolicyAllow

B.

webvpn authorize-device

C.

authentication mfa

D.

authentication aaa certificate

Buy Now
Questions 7

Which SAFE component logically arranges the security capabilities into blueprints?

Options:

A.

Reference Architectures

B.

Cisco Validated Designs

C.

Places in the Network

D.

Secure Domains

Buy Now
Questions 8

Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed. What should be done to meet the requirement?

Options:

A.

Change consumer_filter_ref to HTTP Consumer.

B.

Add HTTP to 14_params.

C.

Decrease the priority of the template to 50.

D.

Increase the priority of the template to 200.

Buy Now
Questions 9

Which types of algorithm does a web application firewall use for zero-day DDoS protection?

Options:

A.

Reactive and heuristic-based

B.

Stochastic and event-based

C.

Correlative and feedback-based

D.

Adaptive and behavioral-based

Buy Now
Questions 10

Drag and drop the five core functions from the left into the order defined by the NIST Cyber security Framework on the right.

Options:

Buy Now
Questions 11

Which common strategy should be used to mitigate directory traversal attacks in a cloud environment?

Options:

A.

Use anti-cross-site request forgery tokens.

B.

Apply the principle of least privilege.

C.

Implement functionality validation.

D.

Limit file system permissions.

Buy Now
Questions 12

What is associated with implementing Cisco zero-trust architecture?

Options:

A.

It verifies trust before granting access to resources.

B.

It focuses on perimeter-based security.

C.

It assumes that all network traffic is trustworthy.

D.

It provides the same security as the VPN technology.

Buy Now
Questions 13

A security analyst detects an employee endpoint making connections to a malicious IP on the internet and downloaded a file named Test0511127691C.pdf. The analyst discovers the machine is infected by trojan malware. What must the analyst do to mitigate the threat using Cisco Secure Endpoint?

Options:

A.

Identify the malicious IPs and place them in a blocked list

B.

Create an IP Block list and add the IP address of the affected endpoint

C.

Enable scheduled scans to detect and block the executable files

D.

Start isolation of the machine on the Computers tab

Buy Now
Questions 14

An administrator received an incident report indicating suspicious activity of a user using a corporate device. The manager requested that the credentials of user user1@cisco.com be reset and synced via the Active Directory. Removing the account should be avoided and used for further investigation on data leak. Which configuration must the administrator apply on the Duo Admin Panel?

Options:

A.

Delete the user in the Users tab option and sync it with the domain controller.

B.

Quarantine the user from all the policies on the Policies tab, including associated devices.

C.

Request the password change on the Device tab on managed devices.

D.

Disable the account on the Users tab and reset the password from the Active Directory.

Buy Now
Questions 15

Refer to the exhibit. An engineer must configure VPN load balancing across two Cisco ASA. The indicated configuration was applied to each firewall; however, the load-balancing encryption scheme fails to work. Which two commands must be run on each firewall to meet the requirements? (Choose two.)

Options:

A.

cluster port 9024

B.

crypto ikev1 policy 1

C.

hash sha-256

D.

encryption aes 256

E.

cluster encryption

Buy Now
Questions 16

Refer to the exhibit. An engineer must troubleshoot an issue with excessive SSH traffic leaving the internal network between the hours of 18:00 and 08:00. The engineer applies a policy to the Cisco ASA firewall to block outbound SSH during the indicated hours; however, the issue persists. What should be done to meet the requirement?

Options:

A.

Change the time of rule 2.

B.

Delete rule 4

C.

Delete rule 3

D.

Change the time of rule 5

Buy Now
Questions 17

A recent InfraGard news release indicates the need to establish a risk ranking for all on-premises and cloud services. The ACME Corporation already performs risk assessments for on-premises services and has applied a risk ranking to them. However, the cloud services that were used lack risk rankings. What Cisco Umbrella function should be used to meet the requirement?

Options:

A.

Secure Internet Gateway

B.

Domain Name Server Filtering

C.

URL Categorization by Talos

D.

App Discovery

Buy Now
Questions 18

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

Options:

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

Buy Now
Exam Code: 300-740
Exam Name: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
Last Update: Oct 2, 2025
Questions: 61
300-740 pdf

300-740 PDF

$33.25  $94.99
300-740 Engine

300-740 Testing Engine

$38.5  $109.99
300-740 PDF + Engine

300-740 PDF + Testing Engine

$50.75  $144.99