Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

300-740 Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers

Questions 4

What must be automated to enhance the efficiency of a security team response?

Options:

A.

Changing all user passwords when a threat is detected

B.

Changing firewall settings for every detected threat, regardless of its severity

C.

Isolating affected systems and applying predefined security policies

D.

Sending an email to the entire organization when a threat is detected

Buy Now
Questions 5

Which types of algorithm does a web application firewall use for zero-day DDoS protection?

Options:

A.

Reactive and heuristic-based

B.

Stochastic and event-based

C.

Correlative and feedback-based

D.

Adaptive and behavioral-based

Buy Now
Questions 6

300-740 Question 6

Refer to the exhibit. An engineer must troubleshoot an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

Options:

A.

SYN flood attack toward the DNS server that has IP address 10.10.10.10

B.

DoS attack toward the 50.10.10.0/24 network from an internal IP address

C.

Ping of Death attack toward the host that has IP address 10.10.10.10

D.

TCP fingerprinting toward the 50.10.10.0/24 network

Buy Now
Questions 7

300-740 Question 7

Refer to the exhibit. A security engineer must configure a posture policy in Cisco ISE to ensure that employee laptops have a critical patch for WannaCry installed before they can access the network. Which posture condition must the engineer configure?

Options:

A.

Patch Management Condition

B.

File Condition

C.

Anti-Virus Condition

D.

Anti-Malware Condition

Buy Now
Questions 8

300-740 Question 8

Refer to the exhibit. An engineer must configure SAML SSO in Cisco ISE to use Microsoft Azure AD as an identity provider. These configurations were performed:

    Configure a SAML IdP in ISE.

    Configure the Azure AD IdP settings.

Which two actions must the engineer take in Cisco ISE? (Choose two.)

Options:

A.

Add a SAML IdP.

B.

Upload metadata from Azure AD to ISE.

C.

Configure SAML groups in ISE.

D.

Configure the External Identity Sources settings.

E.

Configure the Internal Identity Source Sequence setting.

Buy Now
Questions 9

300-740 Question 9

300-740 Question 9

Refer to the exhibit. An engineer must connect an on-premises network to the public cloud using Cisco Umbrella as a Cloud Access Security Broker. The indicated configuration was applied to router R1; however, connectivity to Umbrella fails with this error: %OPENDNS-3-DNS_RES_FAILURE. Which action must be taken on R1 to enable the connection?

Options:

A.

Configure the Open DNS servers with the ip name-server command.

B.

Configure a DHCP scope using the ip dhcp pool command.

C.

Add the opendns in command to the interface configuration.

D.

Add the opendns out command to the interface configuration.

Buy Now
Questions 10

What helps prevent drive-by compromise?

Options:

A.

Ad blockers

B.

VPN

C.

Incognito browsing

D.

Browsing known websites

Buy Now
Questions 11

An engineer must configure certificate-based authentication in a cloud-delivered Cisco Secure Firewall Management Center. Drag and drop the steps from left to right to manually enroll certificates on a Cisco Secure Firewall Threat Defense Virtual device.

300-740 Question 11

Options:

Buy Now
Questions 12

300-740 Question 12

300-740 Question 12

Refer to the exhibit. An engineer is troubleshooting an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

Options:

A.

An attacker installed an SSH server on the host.

B.

An attacker opened port 22 on the host.

C.

An FTP client was installed on a domain controller.

D.

An FTP client was installed on a workstation.

Buy Now
Questions 13

What does the MITRE ATT&CK framework catalog?

Options:

A.

Techniques utilized in cyber attacks

B.

Patterns of system vulnerabilities

C.

Models of threat intelligence sharing

D.

Standards for information security management

Buy Now
Questions 14

Drag and drop the tasks from the left into order on the right to implement adding Duo multifactor authentication to Meraki Client VPN login.

300-740 Question 14

Options:

Buy Now
Questions 15

300-740 Question 15

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

Options:

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

Buy Now
Questions 16

300-740 Question 16

Refer to the exhibit. An engineer must troubleshoot an issue with excessive SSH traffic leaving the internal network between the hours of 18:00 and 08:00. The engineer applies a policy to the Cisco ASA firewall to block outbound SSH during the indicated hours; however, the issue persists. What should be done to meet the requirement?

Options:

A.

Change the time of rule 2.

B.

Delete rule 4

C.

Delete rule 3

D.

Change the time of rule 5

Buy Now
Questions 17

300-740 Question 17

Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed. What should be done to meet the requirement?

Options:

A.

Change consumer_filter_ref to HTTP Consumer.

B.

Add HTTP to 14_params.

C.

Decrease the priority of the template to 50.

D.

Increase the priority of the template to 200.

Buy Now
Questions 18

How does Cisco XDR perform threat prioritization by using its visibility across multiple platforms?

Options:

A.

By assigning priority based on the detection platform

B.

By correlating detection risk and asset value at risk

C.

By prioritizing threats based on their frequency across platforms

D.

By using a fixed priority system for all platforms

Buy Now
Exam Code: 300-740
Exam Name: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
Last Update: Oct 15, 2025
Questions: 61

PDF + Testing Engine

$144.99

Testing Engine

$109.99

PDF (Q&A)

$94.99