Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-740 - Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)

Page: 2 / 2
Total 61 questions

Refer to the exhibit. An engineer must configure SAML single sign-on in Cisco ISE to use Microsoft Azure AD as an identity provider. Drag and drop the steps from the left into the sequence on the right to configure Cisco ISE with SAML single sign-on.

What does the MITRE ATT&CK framework catalog?

A.

Techniques utilized in cyber attacks

B.

Patterns of system vulnerabilities

C.

Models of threat intelligence sharing

D.

Standards for information security management

Refer to the exhibit. An engineer must troubleshoot an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

A.

SYN flood attack toward the DNS server that has IP address 10.10.10.10

B.

DoS attack toward the 50.10.10.0/24 network from an internal IP address

C.

Ping of Death attack toward the host that has IP address 10.10.10.10

D.

TCP fingerprinting toward the 50.10.10.0/24 network

Refer to the exhibit. An engineer must configure SAML SSO in Cisco ISE to use Microsoft Azure AD as an identity provider. These configurations were performed:

    Configure a SAML IdP in ISE.

    Configure the Azure AD IdP settings.

Which two actions must the engineer take in Cisco ISE? (Choose two.)

A.

Add a SAML IdP.

B.

Upload metadata from Azure AD to ISE.

C.

Configure SAML groups in ISE.

D.

Configure the External Identity Sources settings.

E.

Configure the Internal Identity Source Sequence setting.

Refer to the exhibit. An engineer must configure the Cisco ASA firewall to allow the client with IP address 10.1.0.6 to access the Salesforce login page at https://www.salesforce.com. The indicated configuration was applied to the firewall and public DNS 4.4.4.4 is used for name resolution; however, the client still cannot access the URL. What should be done to meet the requirements?

A.

Remove rule 3

B.

Move rule 5 to the top

C.

Remove rule 7

D.

Move rule 6 to the top

Refer to the exhibit. An engineer must configure a global allow list in Cisco Umbrella for the cisco.com domain. All other domains must be blocked. After creating a new policy and adding the cisco.com domain, the engineer attempts to access a site outside of cisco.com and is successful. Which additional Security Settings action must be taken to meet the requirement?

A.

Limit Content Access.

B.

Enforce SafeSearch.

C.

Enable Allow-Only Mode

D.

Apply Destination List.

Which mitigation technique does a web application firewall use to protect a web server against DDoS attacks?

A.

Source-specific ACL

B.

Standard ACL

C.

Packet filtering

D.

Rate-based rules

Which common strategy should be used to mitigate directory traversal attacks in a cloud environment?

A.

Use anti-cross-site request forgery tokens.

B.

Apply the principle of least privilege.

C.

Implement functionality validation.

D.

Limit file system permissions.