Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

300-740 Sample Questions Answers

Questions 4

Refer to the exhibit. An engineer is investigating the critical alert received in Cisco Secure Network Analytics. The engineer confirms that the incident is valid. Which two actions must be taken? (Choose two.)

Options:

A.

Inform the incident management team.

B.

Block IP address 66.77.197.165

C.

Uninstall the Conduit software.

D.

Shut down the host.

E.

Quarantine the host

Buy Now
Questions 5

Which concept is used in the Cisco SAFE key reference model?

Options:

A.

Secure Domains

B.

Cloud Edge

C.

Security Intelligence

D.

Threat Defense

Buy Now
Questions 6

Which common strategy should be used to mitigate directory traversal attacks in a cloud environment?

Options:

A.

Use anti-cross-site request forgery tokens.

B.

Apply the principle of least privilege.

C.

Implement functionality validation.

D.

Limit file system permissions.

Buy Now
Questions 7

Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv1 VPN that will use AES256 and SHA256 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the tunnel fails to establish. Which two IKEv1 policy commands must be run to meet the requirement? (Choose two.)

Options:

A.

encryption aes-256

B.

ipsec-proposal sha-256-aes-256

C.

integrity aes-256

D.

ipsec-proposal AES256-SHA256

E.

hash sha-256

Buy Now
Questions 8

Refer to the exhibit. An engineer is investigating an issue by using Cisco Secure Cloud Analytics. The engineer confirms that the connections are unauthorized and informs the incident management team. Which two actions must be taken next? (Choose two.)

Options:

A.

Reinstall the host from a recent backup.

B.

Quarantine the host

C.

Reinstall the host from scratch.

D.

Create a firewall rule that has a source of linux-gcp-east-4c, a destination of Any, and a protocol of SSH.

E.

Create a firewall rule that has a source of Any, a destination of linux-gcp-east-4c, and a protocol of SSH.

Buy Now
Questions 9

Refer to the exhibit. A security engineer must configure a posture policy in Cisco ISE to ensure that employee laptops have a critical patch for WannaCry installed before they can access the network. Which posture condition must the engineer configure?

Options:

A.

Patch Management Condition

B.

File Condition

C.

Anti-Virus Condition

D.

Anti-Malware Condition

Buy Now
Questions 10

An engineer is configuring multifactor authentication using Duo. The implementation must use Duo Authentication Proxy and the Active Directory as an identity source. The company uses Azure and a local Active Directory. Which configuration is needed to meet the requirement?

Options:

A.

Configure the Identity Source as "SAML" on the Single Sign-On tab in the Duo Admin Panel, and configure the forwarding proxy as "local" for the Identity Source.

B.

Configure the Identity Source as "SAML" on the Single Sign-On tab, and configure the authentication proxy with the "[cloud]" section.

C.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab in the Duo Admin Panel, and configure the permit list to "Local database".

D.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab, and configure the authentication proxy with the "[sso]" section.

Buy Now
Questions 11

Refer to the exhibit. An engineer configured a default segmentation policy in Cisco Secure Workload to block SMTP traffic. During testing, it is observed that the SMTP traffic is still allowed. Which action must the engineer take to complete the configuration?

Options:

A.

Add "port": [25, 25] to _rootScope

B.

Add _SMTPScope to provider_filter_ref

C.

Add "port": [25, 25] to _params

D.

Change consumer_filter_ref to: _SMTPScope

Buy Now
Questions 12

Which web application firewall deployment in the Cisco Secure DDoS protects against application layer and volumetric attacks?

Options:

A.

Hybrid

B.

On-demand

C.

Always-on

D.

Active/passive

Buy Now
Questions 13

Refer to the exhibit. An engineer must integrate Cisco Cloudlock with Salesforce in an organization. Despite the engineer's successful execution of the Salesforce integration with Cloudlock, the administrator still lacks the necessary visibility. What should be done to meet the requirement?

Options:

A.

From Salesforce, configure the service parameters.

B.

From Salesforce, enable the View All Data permission.

C.

From Cloudlock, configure the service parameters.

D.

From Cloudlock, enable the View All Data permission.

Buy Now
Questions 14

In the zero-trust network access model, which criteria is used for continuous verification to modify trust levels?

Options:

A.

System patching status

B.

Detected threat levels

C.

User and device behavior

D.

Network traffic patterns

Buy Now
Questions 15

What must be automated to enhance the efficiency of a security team response?

Options:

A.

Changing all user passwords when a threat is detected

B.

Changing firewall settings for every detected threat, regardless of its severity

C.

Isolating affected systems and applying predefined security policies

D.

Sending an email to the entire organization when a threat is detected

Buy Now
Questions 16

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

Options:

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

Buy Now
Questions 17

Drag and drop the tasks from the left into order on the right to implement adding Duo multifactor authentication to Meraki Client VPN login.

Options:

Buy Now
Questions 18

What is associated with implementing Cisco zero-trust architecture?

Options:

A.

It verifies trust before granting access to resources.

B.

It focuses on perimeter-based security.

C.

It assumes that all network traffic is trustworthy.

D.

It provides the same security as the VPN technology.

Buy Now
Exam Code: 300-740
Exam Name: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
Last Update: Jul 26, 2025
Questions: 61
$61.25  $174.99
$47.25  $134.99
$40.25  $114.99
buy now 300-740