Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

Cisco 300-740 Dumps

Page: 1 / 6
Total 61 questions

Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers

Question 1

as

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

Options:

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

Question 2

as

as

Refer to the exhibit. An engineer is investigating an unauthorized connection issue using Cisco Secure Cloud Analytics. Which two actions must be taken? (Choose two.)

Options:

A.

Reinstall the host from a recent backup.

B.

Inform the incident management team.

C.

Validate the IDS logs

D.

Block the unwanted IP addresses on the firewall

E.

Reinstall the host from scratch.

Question 3

as

Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv1 VPN that will use AES256 and SHA256 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the tunnel fails to establish. Which two IKEv1 policy commands must be run to meet the requirement? (Choose two.)

Options:

A.

encryption aes-256

B.

ipsec-proposal sha-256-aes-256

C.

integrity aes-256

D.

ipsec-proposal AES256-SHA256

E.

hash sha-256

Question 4

as

Refer to the exhibit. An engineer must troubleshoot an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

Options:

A.

SYN flood attack toward the DNS server that has IP address 10.10.10.10

B.

DoS attack toward the 50.10.10.0/24 network from an internal IP address

C.

Ping of Death attack toward the host that has IP address 10.10.10.10

D.

TCP fingerprinting toward the 50.10.10.0/24 network

Question 5

as

as

Refer to the exhibit. An engineer is troubleshooting an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

Options:

A.

An attacker installed an SSH server on the host.

B.

An attacker opened port 22 on the host.

C.

An FTP client was installed on a domain controller.

D.

An FTP client was installed on a workstation.

Question 6

as

Refer to the exhibit. An engineer must integrate Cisco Cloudlock with Salesforce in an organization. Despite the engineer's successful execution of the Salesforce integration with Cloudlock, the administrator still lacks the necessary visibility. What should be done to meet the requirement?

Options:

A.

From Salesforce, configure the service parameters.

B.

From Salesforce, enable the View All Data permission.

C.

From Cloudlock, configure the service parameters.

D.

From Cloudlock, enable the View All Data permission.

Question 7

What does the MITRE ATT&CK framework catalog?

Options:

A.

Techniques utilized in cyber attacks

B.

Patterns of system vulnerabilities

C.

Models of threat intelligence sharing

D.

Standards for information security management

Question 8

as

Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv2 VPN that will use SHA-512 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the tunnel fails to establish. Which command must be run to meet the requirement?

Options:

A.

integrity sha512

B.

protocol esp encryption sha512

C.

ipsec-proposal sha512

D.

encryption sha512

Question 9

as

Refer to the exhibit. An engineer is analyzing a Cisco Secure Firewall Management Center report. Which activity does the output verify?

Options:

A.

An HTTP response from IP address 10.1.104.101 was blocked.

B.

An HTTP request to IP address 10.1.113.7 was blocked.

C.

A DNS request to IP address 172.17.1.2 was blocked.

D.

A DNS response from IP address 10.1.108.100 was blocked.

Question 10

as

Refer to the exhibit. An engineer must configure Cisco ASA so that the Secure Client deployment is removed when the user laptop disconnects from the VPN. The indicated configuration was applied to the Cisco ASA firewall. Which command must be run to meet the requirement?

Options:

A.

client-bypass-protocol enable

B.

anyconnect keep-installer none

C.

anyconnect firewall-rule client-interface

D.

D. client-bypass-protocol disable

Question 11

as

Refer to the exhibit. An engineer must configure SAML single sign-on in Cisco ISE to use Microsoft Azure AD as an identity provider. Drag and drop the steps from the left into the sequence on the right to configure Cisco ISE with SAML single sign-on.

as

Options:

Question 12

Which concept is used in the Cisco SAFE key reference model?

Options:

A.

Secure Domains

B.

Cloud Edge

C.

Security Intelligence

D.

Threat Defense

Question 13

What is a crucial component in the MITRE ATT&CK framework?

Options:

A.

Techniques for accessing credentials

B.

Incident response workflow

C.

Blueprint for a secure network architecture

D.

Best practices for user access management

Question 14

as

Refer to the exhibit. An engineer must implement a remote access VPN solution that provides user and device verification. The company uses Active Directory for user authentication and ID certificates for device identity. Users are currently able to connect using only a valid username and password, even if their computer is missing the required certificate.

Which command from the Cisco ASA tunnel-group completes the requirement of verifying device identity in addition to user identity?

Options:

A.

ldap-attribute-map PolicyAllow

B.

webvpn authorize-device

C.

authentication mfa

D.

authentication aaa certificate

Question 15

Which types of algorithm does a web application firewall use for zero-day DDoS protection?

Options:

A.

Reactive and heuristic-based

B.

Stochastic and event-based

C.

Correlative and feedback-based

D.

Adaptive and behavioral-based

Question 16

An administrator received an incident report indicating suspicious activity of a user using a corporate device. The manager requested that the credentials of user user1@cisco.com be reset and synced via the Active Directory. Removing the account should be avoided and used for further investigation on data leak. Which configuration must the administrator apply on the Duo Admin Panel?

Options:

A.

Delete the user in the Users tab option and sync it with the domain controller.

B.

Quarantine the user from all the policies on the Policies tab, including associated devices.

C.

Request the password change on the Device tab on managed devices.

D.

Disable the account on the Users tab and reset the password from the Active Directory.

Question 17

Which common strategy should be used to mitigate directory traversal attacks in a cloud environment?

Options:

A.

Use anti-cross-site request forgery tokens.

B.

Apply the principle of least privilege.

C.

Implement functionality validation.

D.

Limit file system permissions.

Question 18

as

Refer to the exhibit. An engineer must block internal users from accessing Facebook and Facebook Apps. All other access must be allowed. The indicated policy was created in Cisco Secure Firewall Management Center and deployed to the internet edge firewall; however, users still can access Facebook. Which two actions must be taken to meet the requirement? (Choose two.)

Options:

A.

Set Destination Zones to outside for rule 2.

B.

Set Source Zones to inside for rule 2.

C.

Set Applications to Facebook and Facebook Apps for rule 2.

D.

Set Destination Zones to outside for rule 1.

E.

Set Source Zones to inside for rule 1.

Page: 1 / 6
Total 61 questions