Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)

Last Update 13 hours ago Total Questions : 61

The Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) content is now fully updated, with all current exam questions added 13 hours ago. Deciding to include 300-740 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 300-740 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 300-740 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) practice test comfortably within the allotted time.

Question # 11

According to Cisco Security Reference Architecture, which solution provides threat intelligence and malware analytics?

A.

Cisco pxGrid

B.

Cisco XDR

C.

Cisco Talos

D.

Cisco Umbrella

Question # 12

An administrator must deploy an endpoint posture policy for all users. The organization wants to have all endpoints checked against antimalware definitions and operating system updates and ensure that the correct Secure Client modules are installed properly. How must the administrator meet the requirements?

A.

Configure the WLC to provide local posture services, and configure Cisco ISE to receive the compliance verification from the WLC to be used in an authorization policy.

B.

Create an ASA Firewall posture policy, upload the Secure Client images to the NAD, and create a local client provisioning portal.

C.

Create the required posture policy within Cisco ISE, configure redirection on the NAD, and ensure that the client provisioning policy is correct.

D.

Identify the antimalware being used, create an endpoint script to ensure that it is updated, and send the update log to Cisco ISE for processing.

Question # 13

An administrator received an incident report indicating suspicious activity of a user using a corporate device. The manager requested that the credentials of user user1@cisco.com be reset and synced via the Active Directory. Removing the account should be avoided and used for further investigation on data leak. Which configuration must the administrator apply on the Duo Admin Panel?

A.

Delete the user in the Users tab option and sync it with the domain controller.

B.

Quarantine the user from all the policies on the Policies tab, including associated devices.

C.

Request the password change on the Device tab on managed devices.

D.

Disable the account on the Users tab and reset the password from the Active Directory.

Question # 14

An engineer configures trusted endpoints with Active Directory with Device Health to determine if an endpoint complies with the policy posture. After a week, an alert is received by one user, reporting problems accessing an application. When the engineer verifies the authentication report, this error is found:

" Endpoint is not trusted because Cisco Secure Endpoint check failed, Check user ' s endpoint in Cisco Secure Endpoint. "

Which action must the engineer take to permit access to the application again?

A.

Verify the Cisco Secure Endpoint admin panel and approve the access to the user on the Management tab after a complete virus check of the user ' s laptop.

B.

Verify the Trusted Endpoints policy to verify the status of the machine, and after a complete process of analysis, permit the machine to have access to the application.

C.

Verify the Duo admin panel, check the EndPoints tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

D.

Verify the Cisco Secure Endpoint admin panel, check the Inbox tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

Question # 15

Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed. What should be done to meet the requirement?

A.

Change consumer_filter_ref to HTTP Consumer.

B.

Add HTTP to 14_params.

C.

Decrease the priority of the template to 50.

D.

Increase the priority of the template to 200.

Question # 16

How does Cisco XDR perform threat prioritization by using its visibility across multiple platforms?

A.

By assigning priority based on the detection platform

B.

By correlating detection risk and asset value at risk

C.

By prioritizing threats based on their frequency across platforms

D.

By using a fixed priority system for all platforms

Question # 17

Refer to the exhibit. An engineer is analyzing a Cisco Secure Firewall Management Center report. Which activity does the output verify?

A.

An HTTP response from IP address 10.1.104.101 was blocked.

B.

An HTTP request to IP address 10.1.113.7 was blocked.

C.

A DNS request to IP address 172.17.1.2 was blocked.

D.

A DNS response from IP address 10.1.108.100 was blocked.

Question # 18

Refer to the exhibit. An engineer is troubleshooting an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

A.

An attacker installed an SSH server on the host.

B.

An attacker opened port 22 on the host.

C.

An FTP client was installed on a domain controller.

D.

An FTP client was installed on a workstation.

Go to page: