Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Question and Answers

Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)

Last Update Oct 2, 2025
Total Questions : 61

We are offering FREE 300-740 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-740 free exam questions and then go for complete pool of Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) test questions that will help you more.

300-740 pdf

300-740 PDF

$46  $114.99
300-740 Engine

300-740 Testing Engine

$54  $134.99
300-740 PDF + Engine

300-740 PDF + Testing Engine

$70  $174.99
Questions 1

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

Options:

A.  

Move rule 2 to the first position.

B.  

Configure a NAT overload rule

C.  

Configure a virtual private cloud firewall rule

D.  

Move rule 1 to the last position

Discussion 0
Questions 2

Refer to the exhibit. An engineer must configure a global allow list in Cisco Umbrella for the cisco.com domain. All other domains must be blocked. After creating a new policy and adding the cisco.com domain, the engineer attempts to access a site outside of cisco.com and is successful. Which additional Security Settings action must be taken to meet the requirement?

Options:

A.  

Limit Content Access.

B.  

Enforce SafeSearch.

C.  

Enable Allow-Only Mode

D.  

Apply Destination List.

Discussion 0
Questions 3

Which mitigation technique does a web application firewall use to protect a web server against DDoS attacks?

Options:

A.  

Source-specific ACL

B.  

Standard ACL

C.  

Packet filtering

D.  

Rate-based rules

Discussion 0
Questions 4

Refer to the exhibit. An engineer must integrate Cisco Cloudlock with Salesforce in an organization. Despite the engineer's successful execution of the Salesforce integration with Cloudlock, the administrator still lacks the necessary visibility. What should be done to meet the requirement?

Options:

A.  

From Salesforce, configure the service parameters.

B.  

From Salesforce, enable the View All Data permission.

C.  

From Cloudlock, configure the service parameters.

D.  

From Cloudlock, enable the View All Data permission.

Discussion 0
Questions 5

Refer to the exhibit. An engineer must analyze the Cisco Secure Cloud Analytics report. What is occurring?

Options:

A.  

Persistent remote-control connections

B.  

Distributed DDoS attack

C.  

Geographically unusual remote access

D.  

Memory exhaustion attempt toward port 22

Discussion 0
Questions 6

Refer to the exhibit. An engineer must create a firewall policy to allow web server communication only. The indicated firewall policy was applied; however, a recent audit requires that all firewall policies be optimized. Which set of rules must be deleted?

Options:

A.  

Rules 3 and 4

B.  

Rules 2 to 4

C.  

Rules 2 to 5

D.  

Rules 1 and 5

Discussion 0
Questions 7

Refer to the exhibit. An engineer must configure VPN load balancing across two Cisco ASA. The indicated configuration was applied to each firewall; however, the load-balancing encryption scheme fails to work. Which two commands must be run on each firewall to meet the requirements? (Choose two.)

Options:

A.  

cluster port 9024

B.  

crypto ikev1 policy 1

C.  

hash sha-256

D.  

encryption aes 256

E.  

cluster encryption

Discussion 0
Questions 8

Refer to the exhibit. An engineer is analyzing a Cisco Secure Firewall Management Center report. Which activity does the output verify?

Options:

A.  

An HTTP response from IP address 10.1.104.101 was blocked.

B.  

An HTTP request to IP address 10.1.113.7 was blocked.

C.  

A DNS request to IP address 172.17.1.2 was blocked.

D.  

A DNS response from IP address 10.1.108.100 was blocked.

Discussion 0
Questions 9

An administrator received an incident report indicating suspicious activity of a user using a corporate device. The manager requested that the credentials of user user1@cisco.com be reset and synced via the Active Directory. Removing the account should be avoided and used for further investigation on data leak. Which configuration must the administrator apply on the Duo Admin Panel?

Options:

A.  

Delete the user in the Users tab option and sync it with the domain controller.

B.  

Quarantine the user from all the policies on the Policies tab, including associated devices.

C.  

Request the password change on the Device tab on managed devices.

D.  

Disable the account on the Users tab and reset the password from the Active Directory.

Discussion 0
Questions 10

A security analyst detects an employee endpoint making connections to a malicious IP on the internet and downloaded a file named Test0511127691C.pdf. The analyst discovers the machine is infected by trojan malware. What must the analyst do to mitigate the threat using Cisco Secure Endpoint?

Options:

A.  

Identify the malicious IPs and place them in a blocked list

B.  

Create an IP Block list and add the IP address of the affected endpoint

C.  

Enable scheduled scans to detect and block the executable files

D.  

Start isolation of the machine on the Computers tab

Discussion 0
Questions 11

Refer to the exhibit. An engineer configured a default segmentation policy in Cisco Secure Workload to block SMTP traffic. During testing, it is observed that the SMTP traffic is still allowed. Which action must the engineer take to complete the configuration?

Options:

A.  

Add "port": [25, 25] to _rootScope

B.  

Add _SMTPScope to provider_filter_ref

C.  

Add "port": [25, 25] to _params

D.  

Change consumer_filter_ref to: _SMTPScope

Discussion 0
Questions 12

Refer to the exhibit. An engineer must troubleshoot an issue with excessive SSH traffic leaving the internal network between the hours of 18:00 and 08:00. The engineer applies a policy to the Cisco ASA firewall to block outbound SSH during the indicated hours; however, the issue persists. What should be done to meet the requirement?

Options:

A.  

Change the time of rule 2.

B.  

Delete rule 4

C.  

Delete rule 3

D.  

Change the time of rule 5

Discussion 0
Questions 13

An administrator must deploy an endpoint posture policy for all users. The organization wants to have all endpoints checked against antimalware definitions and operating system updates and ensure that the correct Secure Client modules are installed properly. How must the administrator meet the requirements?

Options:

A.  

Configure the WLC to provide local posture services, and configure Cisco ISE to receive the compliance verification from the WLC to be used in an authorization policy.

B.  

Create an ASA Firewall posture policy, upload the Secure Client images to the NAD, and create a local client provisioning portal.

C.  

Create the required posture policy within Cisco ISE, configure redirection on the NAD, and ensure that the client provisioning policy is correct.

D.  

Identify the antimalware being used, create an endpoint script to ensure that it is updated, and send the update log to Cisco ISE for processing.

Discussion 0
Questions 14

A recent InfraGard news release indicates the need to establish a risk ranking for all on-premises and cloud services. The ACME Corporation already performs risk assessments for on-premises services and has applied a risk ranking to them. However, the cloud services that were used lack risk rankings. What Cisco Umbrella function should be used to meet the requirement?

Options:

A.  

Secure Internet Gateway

B.  

Domain Name Server Filtering

C.  

URL Categorization by Talos

D.  

App Discovery

Discussion 0
Questions 15

What is a crucial component in the MITRE ATT&CK framework?

Options:

A.  

Techniques for accessing credentials

B.  

Incident response workflow

C.  

Blueprint for a secure network architecture

D.  

Best practices for user access management

Discussion 0
Questions 16

Refer to the exhibit. An engineer must provide HTTPS access from the Google Cloud Platform virtual machine to the on-premises mail server. All other connections from the virtual machine to the mail server must be blocked. The indicated rules were applied to the firewall; however, the virtual machine cannot access the mail server. Which two actions should be performed on the firewall to meet the requirement? (Choose two.)

Options:

A.  

Set IP address 192.168.200.10 as the destination in rule 1.

B.  

Move up rule 2.

C.  

Set IP address 20.1.1.1 as the source in rule 1.

D.  

Configure a NAT rule.

E.  

Configure a security group.

Discussion 0
Questions 17

Refer to the exhibit. An engineer must configure multifactor authentication using the Duo Mobile app to provide admin access to a Cisco Meraki switch. The engineer already configured Duo Mobile and received an activation code. Drag and drop the steps from left to right to complete the configuration.

Options:

Discussion 0
Questions 18

Drag and drop the tasks from the left into order on the right to implement adding Duo multifactor authentication to Meraki Client VPN login.

Options:

Discussion 0