Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

300-740 Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers

Questions 4

300-740 Question 4

300-740 Question 4

Refer to the exhibit. An engineer must connect an on-premises network to the public cloud using Cisco Umbrella as a Cloud Access Security Broker. The indicated configuration was applied to router R1; however, connectivity to Umbrella fails with this error: %OPENDNS-3-DNS_RES_FAILURE. Which action must be taken on R1 to enable the connection?

Options:

A.

Configure the Open DNS servers with the ip name-server command.

B.

Configure a DHCP scope using the ip dhcp pool command.

C.

Add the opendns in command to the interface configuration.

D.

Add the opendns out command to the interface configuration.

Buy Now
Questions 5

Which attack mitigation must be in place to prevent an attacker from authenticating to a service using a brute force attack?

Options:

A.

Forced password change every 6 months

B.

Use of a 100 ms delay between each authentication

C.

Use of a password manager

D.

Use of multifactor authentication for all accounts

Buy Now
Questions 6

Which mitigation technique does a web application firewall use to protect a web server against DDoS attacks?

Options:

A.

Source-specific ACL

B.

Standard ACL

C.

Packet filtering

D.

Rate-based rules

Buy Now
Questions 7

300-740 Question 7

Refer to the exhibit. An engineer must configure SAML SSO in Cisco ISE to use Microsoft Azure AD as an identity provider. These configurations were performed:

    Configure a SAML IdP in ISE.

    Configure the Azure AD IdP settings.

Which two actions must the engineer take in Cisco ISE? (Choose two.)

Options:

A.

Add a SAML IdP.

B.

Upload metadata from Azure AD to ISE.

C.

Configure SAML groups in ISE.

D.

Configure the External Identity Sources settings.

E.

Configure the Internal Identity Source Sequence setting.

Buy Now
Questions 8

300-740 Question 8

Refer to the exhibit. An engineer must troubleshoot an issue with excessive SSH traffic leaving the internal network between the hours of 18:00 and 08:00. The engineer applies a policy to the Cisco ASA firewall to block outbound SSH during the indicated hours; however, the issue persists. What should be done to meet the requirement?

Options:

A.

Change the time of rule 2.

B.

Delete rule 4

C.

Delete rule 3

D.

Change the time of rule 5

Buy Now
Questions 9

An engineer is configuring multifactor authentication using Duo. The implementation must use Duo Authentication Proxy and the Active Directory as an identity source. The company uses Azure and a local Active Directory. Which configuration is needed to meet the requirement?

Options:

A.

Configure the Identity Source as " SAML " on the Single Sign-On tab in the Duo Admin Panel, and configure the forwarding proxy as " local " for the Identity Source.

B.

Configure the Identity Source as " SAML " on the Single Sign-On tab, and configure the authentication proxy with the " [cloud] " section.

C.

Configure the Identity Source as " Active Directory " on the Single Sign-On tab in the Duo Admin Panel, and configure the permit list to " Local database " .

D.

Configure the Identity Source as " Active Directory " on the Single Sign-On tab, and configure the authentication proxy with the " [sso] " section.

Buy Now
Questions 10

300-740 Question 10

Refer to the exhibit. An engineer must analyze the Cisco Secure Cloud Analytics report. What is occurring?

Options:

A.

Persistent remote-control connections

B.

Distributed DDoS attack

C.

Geographically unusual remote access

D.

Memory exhaustion attempt toward port 22

Buy Now
Questions 11

Drag and drop the tasks from the left into order on the right to implement adding Duo multifactor authentication to Meraki Client VPN login.

300-740 Question 11

Options:

Buy Now
Questions 12

What does the Cisco Telemetry Broker provide for telemetry data?

Options:

A.

Data analytics

B.

Data mining

C.

Data filtering

D.

Data brokering

Buy Now
Questions 13

Which SAFE component logically arranges the security capabilities into blueprints?

Options:

A.

Reference Architectures

B.

Cisco Validated Designs

C.

Places in the Network

D.

Secure Domains

Buy Now
Questions 14

300-740 Question 14

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

Options:

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

Buy Now
Questions 15

300-740 Question 15

Refer to the exhibit. An engineer must configure Duo SSO for Cisco Webex and add the Webex application to the Duo Access Gateway. Which two actions must be taken in Duo? (Choose two.)

Options:

A.

Upload the application XML metadata file.

B.

Upload the SAML application JSON file.

C.

Configure the Applications settings for Cisco Webex.

D.

Import the Identity Provider metadata.

E.

Add a new application to the Duo platform.

Buy Now
Questions 16

What is associated with implementing Cisco zero-trust architecture?

Options:

A.

It verifies trust before granting access to resources.

B.

It focuses on perimeter-based security.

C.

It assumes that all network traffic is trustworthy.

D.

It provides the same security as the VPN technology.

Buy Now
Questions 17

Which concept is used in the Cisco SAFE key reference model?

Options:

A.

Secure Domains

B.

Cloud Edge

C.

Security Intelligence

D.

Threat Defense

Buy Now
Questions 18

An administrator must deploy an endpoint posture policy for all users. The organization wants to have all endpoints checked against antimalware definitions and operating system updates and ensure that the correct Secure Client modules are installed properly. How must the administrator meet the requirements?

Options:

A.

Configure the WLC to provide local posture services, and configure Cisco ISE to receive the compliance verification from the WLC to be used in an authorization policy.

B.

Create an ASA Firewall posture policy, upload the Secure Client images to the NAD, and create a local client provisioning portal.

C.

Create the required posture policy within Cisco ISE, configure redirection on the NAD, and ensure that the client provisioning policy is correct.

D.

Identify the antimalware being used, create an endpoint script to ensure that it is updated, and send the update log to Cisco ISE for processing.

Buy Now
Exam Code: 300-740
Exam Name: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
Last Update: Apr 30, 2026
Questions: 61

PDF + Testing Engine

$65.27  $186.49

Testing Engine

$52.32  $149.49
buy now 300-740 testing engine

PDF (Q&A)

$48.12  $137.49
buy now 300-740 pdf