Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-740 - Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)

Page: 1 / 2
Total 61 questions

Refer to the exhibit. An engineer must troubleshoot an issue with excessive SSH traffic leaving the internal network between the hours of 18:00 and 08:00. The engineer applies a policy to the Cisco ASA firewall to block outbound SSH during the indicated hours; however, the issue persists. What should be done to meet the requirement?

A.

Change the time of rule 2.

B.

Delete rule 4

C.

Delete rule 3

D.

Change the time of rule 5

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

Refer to the exhibit. An engineer is investigating an unauthorized connection issue using Cisco Secure Cloud Analytics. Which two actions must be taken? (Choose two.)

A.

Reinstall the host from a recent backup.

B.

Inform the incident management team.

C.

Validate the IDS logs

D.

Block the unwanted IP addresses on the firewall

E.

Reinstall the host from scratch.

What does the Cisco Telemetry Broker provide for telemetry data?

A.

Data analytics

B.

Data mining

C.

Data filtering

D.

Data brokering

Refer to the exhibit. An engineer must analyze a segmentation policy in Cisco Secure Workload. What is the result of applying the policy?

A.

The default catch-all rule is applied by using Rule #3.

B.

HR cannot use Telnet to connect to IT by using Rule #2.

C.

HR can use Telnet to connect to IT by using Rule #1.

D.

The explicit deny all rule is applied.

Which concept is used in the Cisco SAFE key reference model?

A.

Secure Domains

B.

Cloud Edge

C.

Security Intelligence

D.

Threat Defense

Refer to the exhibit. An engineer must create a policy in Cisco Secure Firewall Management Center to prevent restricted users from being able to browse any business or mobile phone shopping websites. The indicated policy was applied; however, the restricted users still can browse on the mobile phone shopping websites during business hours. What should be done to meet the requirement?

A.

Set Dest Zones to Business Mobile Phones Shopping.

B.

Set Dest Networks to Business Mobile Phones Shopping.

C.

Set Time Range for rule 4 of Access Controlled Groups to All.

D.

Move rule 4 Access Controlled Groups to the top.

In the zero-trust network access model, which criteria is used for continuous verification to modify trust levels?

A.

System patching status

B.

Detected threat levels

C.

User and device behavior

D.

Network traffic patterns

Refer to the exhibit. An engineer must configure Duo SSO for Cisco Webex and add the Webex application to the Duo Access Gateway. Which two actions must be taken in Duo? (Choose two.)

A.

Upload the application XML metadata file.

B.

Upload the SAML application JSON file.

C.

Configure the Applications settings for Cisco Webex.

D.

Import the Identity Provider metadata.

E.

Add a new application to the Duo platform.

Refer to the exhibit. An engineer must analyze the Cisco Secure Cloud Analytics report. What is occurring?

A.

Persistent remote-control connections

B.

Distributed DDoS attack

C.

Geographically unusual remote access

D.

Memory exhaustion attempt toward port 22