Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

Cisco 300-740 Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Exam Practice Test

Page: 1 / 0
Total 0 questions

Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers

Question 1

Refer to the exhibit. An engineer must configure SAML single sign-on in Cisco ISE to use Microsoft Azure AD as an identity provider. Drag and drop the steps from the left into the sequence on the right to configure Cisco ISE with SAML single sign-on.

Options:

Question 2

Refer to the exhibit. An engineer must configure Cisco ASA so that the Secure Client deployment is removed when the user laptop disconnects from the VPN. The indicated configuration was applied to the Cisco ASA firewall. Which command must be run to meet the requirement?

Options:

A.

client-bypass-protocol enable

B.

anyconnect keep-installer none

C.

anyconnect firewall-rule client-interface

D.

D. client-bypass-protocol disable

Question 3

According to Cisco Security Reference Architecture, which solution provides threat intelligence and malware analytics?

Options:

A.

Cisco pxGrid

B.

Cisco XDR

C.

Cisco Talos

D.

Cisco Umbrella

Question 4

Refer to the exhibit. An engineer must configure SAML SSO in Cisco ISE to use Microsoft Azure AD as an identity provider. These configurations were performed:

    Configure a SAML IdP in ISE.

    Configure the Azure AD IdP settings.

Which two actions must the engineer take in Cisco ISE? (Choose two.)

Options:

A.

Add a SAML IdP.

B.

Upload metadata from Azure AD to ISE.

C.

Configure SAML groups in ISE.

D.

Configure the External Identity Sources settings.

E.

Configure the Internal Identity Source Sequence setting.

Question 5

Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv2 VPN that will use SHA-512 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the tunnel fails to establish. Which command must be run to meet the requirement?

Options:

A.

integrity sha512

B.

protocol esp encryption sha512

C.

ipsec-proposal sha512

D.

encryption sha512

Question 6

Refer to the exhibit. An engineer must configure VPN load balancing across two Cisco ASA. The indicated configuration was applied to each firewall; however, the load-balancing encryption scheme fails to work. Which two commands must be run on each firewall to meet the requirements? (Choose two.)

Options:

A.

cluster port 9024

B.

crypto ikev1 policy 1

C.

hash sha-256

D.

encryption aes 256

E.

cluster encryption

Question 7

Which attack mitigation must be in place to prevent an attacker from authenticating to a service using a brute force attack?

Options:

A.

Forced password change every 6 months

B.

Use of a 100 ms delay between each authentication

C.

Use of a password manager

D.

Use of multifactor authentication for all accounts

Question 8

An engineer is configuring multifactor authentication using Duo. The implementation must use Duo Authentication Proxy and the Active Directory as an identity source. The company uses Azure and a local Active Directory. Which configuration is needed to meet the requirement?

Options:

A.

Configure the Identity Source as "SAML" on the Single Sign-On tab in the Duo Admin Panel, and configure the forwarding proxy as "local" for the Identity Source.

B.

Configure the Identity Source as "SAML" on the Single Sign-On tab, and configure the authentication proxy with the "[cloud]" section.

C.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab in the Duo Admin Panel, and configure the permit list to "Local database".

D.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab, and configure the authentication proxy with the "[sso]" section.

Question 9

Refer to the exhibit. An engineer is troubleshooting an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

Options:

A.

An attacker installed an SSH server on the host.

B.

An attacker opened port 22 on the host.

C.

An FTP client was installed on a domain controller.

D.

An FTP client was installed on a workstation.

Question 10

Refer to the exhibit. An engineer must create a firewall policy to allow web server communication only. The indicated firewall policy was applied; however, a recent audit requires that all firewall policies be optimized. Which set of rules must be deleted?

Options:

A.

Rules 3 and 4

B.

Rules 2 to 4

C.

Rules 2 to 5

D.

Rules 1 and 5

Question 11

Refer to the exhibit. An engineer must create a policy in Cisco Secure Firewall Management Center to prevent restricted users from being able to browse any business or mobile phone shopping websites. The indicated policy was applied; however, the restricted users still can browse on the mobile phone shopping websites during business hours. What should be done to meet the requirement?

Options:

A.

Set Dest Zones to Business Mobile Phones Shopping.

B.

Set Dest Networks to Business Mobile Phones Shopping.

C.

Set Time Range for rule 4 of Access Controlled Groups to All.

D.

Move rule 4 Access Controlled Groups to the top.

Question 12

A recent InfraGard news release indicates the need to establish a risk ranking for all on-premises and cloud services. The ACME Corporation already performs risk assessments for on-premises services and has applied a risk ranking to them. However, the cloud services that were used lack risk rankings. What Cisco Umbrella function should be used to meet the requirement?

Options:

A.

Secure Internet Gateway

B.

Domain Name Server Filtering

C.

URL Categorization by Talos

D.

App Discovery

Question 13

Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed. What should be done to meet the requirement?

Options:

A.

Change consumer_filter_ref to HTTP Consumer.

B.

Add HTTP to 14_params.

C.

Decrease the priority of the template to 50.

D.

Increase the priority of the template to 200.

Question 14

Which concept is used in the Cisco SAFE key reference model?

Options:

A.

Secure Domains

B.

Cloud Edge

C.

Security Intelligence

D.

Threat Defense

Question 15

Refer to the exhibit. An engineer must integrate Cisco Cloudlock with Salesforce in an organization. Despite the engineer's successful execution of the Salesforce integration with Cloudlock, the administrator still lacks the necessary visibility. What should be done to meet the requirement?

Options:

A.

From Salesforce, configure the service parameters.

B.

From Salesforce, enable the View All Data permission.

C.

From Cloudlock, configure the service parameters.

D.

From Cloudlock, enable the View All Data permission.

Question 16

Refer to the exhibit. A security engineer must configure a posture policy in Cisco ISE to ensure that employee laptops have a critical patch for WannaCry installed before they can access the network. Which posture condition must the engineer configure?

Options:

A.

Patch Management Condition

B.

File Condition

C.

Anti-Virus Condition

D.

Anti-Malware Condition

Question 17

Refer to the exhibit. An engineer is investigating an issue by using Cisco Secure Cloud Analytics. The engineer confirms that the connections are unauthorized and informs the incident management team. Which two actions must be taken next? (Choose two.)

Options:

A.

Reinstall the host from a recent backup.

B.

Quarantine the host

C.

Reinstall the host from scratch.

D.

Create a firewall rule that has a source of linux-gcp-east-4c, a destination of Any, and a protocol of SSH.

E.

Create a firewall rule that has a source of Any, a destination of linux-gcp-east-4c, and a protocol of SSH.

Question 18

An engineer configures trusted endpoints with Active Directory with Device Health to determine if an endpoint complies with the policy posture. After a week, an alert is received by one user, reporting problems accessing an application. When the engineer verifies the authentication report, this error is found:

"Endpoint is not trusted because Cisco Secure Endpoint check failed, Check user's endpoint in Cisco Secure Endpoint."

Which action must the engineer take to permit access to the application again?

Options:

A.

Verify the Cisco Secure Endpoint admin panel and approve the access to the user on the Management tab after a complete virus check of the user's laptop.

B.

Verify the Trusted Endpoints policy to verify the status of the machine, and after a complete process of analysis, permit the machine to have access to the application.

C.

Verify the Duo admin panel, check the EndPoints tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

D.

Verify the Cisco Secure Endpoint admin panel, check the Inbox tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

Page: 1 / 0
Total 0 questions