Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-740 Cisco Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-740 Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 61 questions

Refer to the exhibit. An engineer must configure the Cisco ASA firewall to allow the client with IP address 10.1.0.6 to access the Salesforce login page at https://www.salesforce.com. The indicated configuration was applied to the firewall and public DNS 4.4.4.4 is used for name resolution; however, the client still cannot access the URL. What should be done to meet the requirements?

A.

Remove rule 3

B.

Move rule 5 to the top

C.

Remove rule 7

D.

Move rule 6 to the top

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

A security analyst detects an employee endpoint making connections to a malicious IP on the internet and downloaded a file named Test0511127691C.pdf. The analyst discovers the machine is infected by trojan malware. What must the analyst do to mitigate the threat using Cisco Secure Endpoint?

A.

Identify the malicious IPs and place them in a blocked list

B.

Create an IP Block list and add the IP address of the affected endpoint

C.

Enable scheduled scans to detect and block the executable files

D.

Start isolation of the machine on the Computers tab

What is associated with implementing Cisco zero-trust architecture?

A.

It verifies trust before granting access to resources.

B.

It focuses on perimeter-based security.

C.

It assumes that all network traffic is trustworthy.

D.

It provides the same security as the VPN technology.

What must be automated to enhance the efficiency of a security team response?

A.

Changing all user passwords when a threat is detected

B.

Changing firewall settings for every detected threat, regardless of its severity

C.

Isolating affected systems and applying predefined security policies

D.

Sending an email to the entire organization when a threat is detected

Which types of algorithm does a web application firewall use for zero-day DDoS protection?

A.

Reactive and heuristic-based

B.

Stochastic and event-based

C.

Correlative and feedback-based

D.

Adaptive and behavioral-based

Which web application firewall deployment in the Cisco Secure DDoS protects against application layer and volumetric attacks?

A.

Hybrid

B.

On-demand

C.

Always-on

D.

Active/passive

A network administrator uses Cisco Umbrella to protect internal users from malicious content. A customer is using an IPsec tunnel to connect to an Umbrella Organization. The administrator was informed about a zero-day vulnerability that infects user machines and uploads sensitive data through the RDP port. The administrator must ensure that no users are connected to the internet using the RDP protocol. Which Umbrella configuration must the administrator apply?

A.

Web policy to block Remote Desktop Manager application type

B.

Firewall policy and set port 3389 to be blocked for all outgoing traffic

C.

Data loss prevention policy to block all file uploads with RDP application mime type

D.

DNS policy to block Remote Desktop Manager application type

Refer to the exhibit. An engineer must troubleshoot an issue with excessive SSH traffic leaving the internal network between the hours of 18:00 and 08:00. The engineer applies a policy to the Cisco ASA firewall to block outbound SSH during the indicated hours; however, the issue persists. What should be done to meet the requirement?

A.

Change the time of rule 2.

B.

Delete rule 4

C.

Delete rule 3

D.

Change the time of rule 5

Refer to the exhibit. An engineer must provide HTTPS access from the Google Cloud Platform virtual machine to the on-premises mail server. All other connections from the virtual machine to the mail server must be blocked. The indicated rules were applied to the firewall; however, the virtual machine cannot access the mail server. Which two actions should be performed on the firewall to meet the requirement? (Choose two.)

A.

Set IP address 192.168.200.10 as the destination in rule 1.

B.

Move up rule 2.

C.

Set IP address 20.1.1.1 as the source in rule 1.

D.

Configure a NAT rule.

E.

Configure a security group.

An organization is distributed across several sites. Each site is connected to the main HQ using site-to-site VPNs implemented using Secure Firewall Threat Defense. Which functionality must be implemented if the security manager wants to send SaaS traffic directly to the internet?

A.

Multi-instances

B.

IPsec tunnels

C.

Policy-based routing

D.

ECMP routing

What does the Cisco Telemetry Broker provide for telemetry data?

A.

Data analytics

B.

Data mining

C.

Data filtering

D.

Data brokering

What does the MITRE ATT&CK framework catalog?

A.

Techniques utilized in cyber attacks

B.

Patterns of system vulnerabilities

C.

Models of threat intelligence sharing

D.

Standards for information security management

Refer to the exhibit. An engineer must integrate Cisco Cloudlock with Salesforce in an organization. Despite the engineer's successful execution of the Salesforce integration with Cloudlock, the administrator still lacks the necessary visibility. What should be done to meet the requirement?

A.

From Salesforce, configure the service parameters.

B.

From Salesforce, enable the View All Data permission.

C.

From Cloudlock, configure the service parameters.

D.

From Cloudlock, enable the View All Data permission.

Refer to the exhibit. An engineer must create a firewall policy to allow web server communication only. The indicated firewall policy was applied; however, a recent audit requires that all firewall policies be optimized. Which set of rules must be deleted?

A.

Rules 3 and 4

B.

Rules 2 to 4

C.

Rules 2 to 5

D.

Rules 1 and 5

According to the MITRE ATT&CK framework, which approach should be used to mitigate exploitation risks?

A.

Performing regular data backups and testing recovery procedures

B.

Keeping systems updated with the latest patches

C.

Consistently maintaining up-to-date antivirus software

D.

Ensuring that network traffic is closely monitored and controlled

How does Cisco XDR perform threat prioritization by using its visibility across multiple platforms?

A.

By assigning priority based on the detection platform

B.

By correlating detection risk and asset value at risk

C.

By prioritizing threats based on their frequency across platforms

D.

By using a fixed priority system for all platforms

An administrator received an incident report indicating suspicious activity of a user using a corporate device. The manager requested that the credentials of user user1@cisco.com be reset and synced via the Active Directory. Removing the account should be avoided and used for further investigation on data leak. Which configuration must the administrator apply on the Duo Admin Panel?

A.

Delete the user in the Users tab option and sync it with the domain controller.

B.

Quarantine the user from all the policies on the Policies tab, including associated devices.

C.

Request the password change on the Device tab on managed devices.

D.

Disable the account on the Users tab and reset the password from the Active Directory.

Page: 1 / 1
Total 61 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved