Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

300-740 Exam Dumps - Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)

Go to page:
Question # 9

Refer to the exhibit. An engineer is investigating the critical alert received in Cisco Secure Network Analytics. The engineer confirms that the incident is valid. Which two actions must be taken? (Choose two.)

A.

Inform the incident management team.

B.

Block IP address 66.77.197.165

C.

Uninstall the Conduit software.

D.

Shut down the host.

E.

Quarantine the host

Full Access
Question # 10

What is associated with implementing Cisco zero-trust architecture?

A.

It verifies trust before granting access to resources.

B.

It focuses on perimeter-based security.

C.

It assumes that all network traffic is trustworthy.

D.

It provides the same security as the VPN technology.

Full Access
Question # 11

Refer to the exhibit. An engineer must configure VPN load balancing across two Cisco ASA. The indicated configuration was applied to each firewall; however, the load-balancing encryption scheme fails to work. Which two commands must be run on each firewall to meet the requirements? (Choose two.)

A.

cluster port 9024

B.

crypto ikev1 policy 1

C.

hash sha-256

D.

encryption aes 256

E.

cluster encryption

Full Access
Question # 12

Refer to the exhibit. An engineer must configure SAML SSO in Cisco ISE to use Microsoft Azure AD as an identity provider. These configurations were performed:

    Configure a SAML IdP in ISE.

    Configure the Azure AD IdP settings.

Which two actions must the engineer take in Cisco ISE? (Choose two.)

A.

Add a SAML IdP.

B.

Upload metadata from Azure AD to ISE.

C.

Configure SAML groups in ISE.

D.

Configure the External Identity Sources settings.

E.

Configure the Internal Identity Source Sequence setting.

Full Access
Question # 13

An administrator must deploy an endpoint posture policy for all users. The organization wants to have all endpoints checked against antimalware definitions and operating system updates and ensure that the correct Secure Client modules are installed properly. How must the administrator meet the requirements?

A.

Configure the WLC to provide local posture services, and configure Cisco ISE to receive the compliance verification from the WLC to be used in an authorization policy.

B.

Create an ASA Firewall posture policy, upload the Secure Client images to the NAD, and create a local client provisioning portal.

C.

Create the required posture policy within Cisco ISE, configure redirection on the NAD, and ensure that the client provisioning policy is correct.

D.

Identify the antimalware being used, create an endpoint script to ensure that it is updated, and send the update log to Cisco ISE for processing.

Full Access
Question # 14

Refer to the exhibit. An engineer is troubleshooting an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

A.

An attacker installed an SSH server on the host.

B.

An attacker opened port 22 on the host.

C.

An FTP client was installed on a domain controller.

D.

An FTP client was installed on a workstation.

Full Access
Question # 15

A recent InfraGard news release indicates the need to establish a risk ranking for all on-premises and cloud services. The ACME Corporation already performs risk assessments for on-premises services and has applied a risk ranking to them. However, the cloud services that were used lack risk rankings. What Cisco Umbrella function should be used to meet the requirement?

A.

Secure Internet Gateway

B.

Domain Name Server Filtering

C.

URL Categorization by Talos

D.

App Discovery

Full Access
Question # 16

What does the MITRE ATT&CK framework catalog?

A.

Techniques utilized in cyber attacks

B.

Patterns of system vulnerabilities

C.

Models of threat intelligence sharing

D.

Standards for information security management

Full Access
Go to page: