Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

300-740 Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers

Questions 4

According to the MITRE ATT&CK framework, which approach should be used to mitigate exploitation risks?

Options:

A.

Performing regular data backups and testing recovery procedures

B.

Keeping systems updated with the latest patches

C.

Consistently maintaining up-to-date antivirus software

D.

Ensuring that network traffic is closely monitored and controlled

Buy Now
Questions 5

300-740 Question 5

Refer to the exhibit. An engineer must configure SAML single sign-on in Cisco ISE to use Microsoft Azure AD as an identity provider. Drag and drop the steps from the left into the sequence on the right to configure Cisco ISE with SAML single sign-on.

300-740 Question 5

Options:

Buy Now
Questions 6

An engineer must configure certificate-based authentication in a cloud-delivered Cisco Secure Firewall Management Center. Drag and drop the steps from left to right to manually enroll certificates on a Cisco Secure Firewall Threat Defense Virtual device.

300-740 Question 6

Options:

Buy Now
Questions 7

300-740 Question 7

Refer to the exhibit. An engineer must configure multifactor authentication using the Duo Mobile app to provide admin access to a Cisco Meraki switch. The engineer already configured Duo Mobile and received an activation code. Drag and drop the steps from left to right to complete the configuration.

300-740 Question 7

Options:

Buy Now
Questions 8

300-740 Question 8

300-740 Question 8

Refer to the exhibit. An engineer is investigating an issue by using Cisco Secure Cloud Analytics. The engineer confirms that the connections are unauthorized and informs the incident management team. Which two actions must be taken next? (Choose two.)

Options:

A.

Reinstall the host from a recent backup.

B.

Quarantine the host

C.

Reinstall the host from scratch.

D.

Create a firewall rule that has a source of linux-gcp-east-4c, a destination of Any, and a protocol of SSH.

E.

Create a firewall rule that has a source of Any, a destination of linux-gcp-east-4c, and a protocol of SSH.

Buy Now
Questions 9

300-740 Question 9

Refer to the exhibit. An engineer configured a default segmentation policy in Cisco Secure Workload to block SMTP traffic. During testing, it is observed that the SMTP traffic is still allowed. Which action must the engineer take to complete the configuration?

Options:

A.

Add "port": [25, 25] to _rootScope

B.

Add _SMTPScope to provider_filter_ref

C.

Add "port": [25, 25] to _params

D.

Change consumer_filter_ref to: _SMTPScope

Buy Now
Questions 10

An administrator received an incident report indicating suspicious activity of a user using a corporate device. The manager requested that the credentials of user user1@cisco.com be reset and synced via the Active Directory. Removing the account should be avoided and used for further investigation on data leak. Which configuration must the administrator apply on the Duo Admin Panel?

Options:

A.

Delete the user in the Users tab option and sync it with the domain controller.

B.

Quarantine the user from all the policies on the Policies tab, including associated devices.

C.

Request the password change on the Device tab on managed devices.

D.

Disable the account on the Users tab and reset the password from the Active Directory.

Buy Now
Questions 11

Which concept is used in the Cisco SAFE key reference model?

Options:

A.

Secure Domains

B.

Cloud Edge

C.

Security Intelligence

D.

Threat Defense

Buy Now
Questions 12

300-740 Question 12

Refer to the exhibit. An engineer must configure the Cisco ASA firewall to allow the client with IP address 10.1.0.6 to access the Salesforce login page at https://www.salesforce.com. The indicated configuration was applied to the firewall and public DNS 4.4.4.4 is used for name resolution; however, the client still cannot access the URL. What should be done to meet the requirements?

Options:

A.

Remove rule 3

B.

Move rule 5 to the top

C.

Remove rule 7

D.

Move rule 6 to the top

Buy Now
Questions 13

A network administrator uses Cisco Umbrella to protect internal users from malicious content. A customer is using an IPsec tunnel to connect to an Umbrella Organization. The administrator was informed about a zero-day vulnerability that infects user machines and uploads sensitive data through the RDP port. The administrator must ensure that no users are connected to the internet using the RDP protocol. Which Umbrella configuration must the administrator apply?

Options:

A.

Web policy to block Remote Desktop Manager application type

B.

Firewall policy and set port 3389 to be blocked for all outgoing traffic

C.

Data loss prevention policy to block all file uploads with RDP application mime type

D.

DNS policy to block Remote Desktop Manager application type

Buy Now
Questions 14

300-740 Question 14

Refer to the exhibit. An engineer must configure SAML SSO in Cisco ISE to use Microsoft Azure AD as an identity provider. These configurations were performed:

    Configure a SAML IdP in ISE.

    Configure the Azure AD IdP settings.

Which two actions must the engineer take in Cisco ISE? (Choose two.)

Options:

A.

Add a SAML IdP.

B.

Upload metadata from Azure AD to ISE.

C.

Configure SAML groups in ISE.

D.

Configure the External Identity Sources settings.

E.

Configure the Internal Identity Source Sequence setting.

Buy Now
Questions 15

300-740 Question 15

Refer to the exhibit. An engineer must troubleshoot an issue with excessive SSH traffic leaving the internal network between the hours of 18:00 and 08:00. The engineer applies a policy to the Cisco ASA firewall to block outbound SSH during the indicated hours; however, the issue persists. What should be done to meet the requirement?

Options:

A.

Change the time of rule 2.

B.

Delete rule 4

C.

Delete rule 3

D.

Change the time of rule 5

Buy Now
Questions 16

300-740 Question 16

Refer to the exhibit. An engineer must analyze the Cisco Secure Cloud Analytics report. What is occurring?

Options:

A.

Persistent remote-control connections

B.

Distributed DDoS attack

C.

Geographically unusual remote access

D.

Memory exhaustion attempt toward port 22

Buy Now
Questions 17

According to Cisco Security Reference Architecture, which solution provides threat intelligence and malware analytics?

Options:

A.

Cisco pxGrid

B.

Cisco XDR

C.

Cisco Talos

D.

Cisco Umbrella

Buy Now
Questions 18

300-740 Question 18

Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed. What should be done to meet the requirement?

Options:

A.

Change consumer_filter_ref to HTTP Consumer.

B.

Add HTTP to 14_params.

C.

Decrease the priority of the template to 50.

D.

Increase the priority of the template to 200.

Buy Now
Exam Code: 300-740
Exam Name: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
Last Update: Jul 27, 2025
Questions: 61

PDF + Testing Engine

$74.6  $186.49

Testing Engine

$59.8  $149.49
buy now 300-740 testing engine

PDF (Q&A)

$55  $137.49
buy now 300-740 pdf