Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

300-740 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

300-740 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
  • Last Update: Sep 12, 2025
  • Questions and Answers: 61
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

300-740 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

300-740 Practice Exam Questions with Answers Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Certification

Question # 6

300-740 question answer

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

Full Access
Question # 7

300-740 question answer

Refer to the exhibit. A security engineer deployed Cisco Secure XDR, and during testing, the log entry shows a security incident. Which action must the engineer take first?

A.

Uninstall the malware.

B.

Block IP address 10.77.17.45.

C.

Isolate the endpoint.

D.

Rebuild the endpoint.

Full Access
Question # 8

300-740 question answer

Refer to the exhibit. An engineer must block internal users from accessing Facebook and Facebook Apps. All other access must be allowed. The indicated policy was created in Cisco Secure Firewall Management Center and deployed to the internet edge firewall; however, users still can access Facebook. Which two actions must be taken to meet the requirement? (Choose two.)

A.

Set Destination Zones to outside for rule 2.

B.

Set Source Zones to inside for rule 2.

C.

Set Applications to Facebook and Facebook Apps for rule 2.

D.

Set Destination Zones to outside for rule 1.

E.

Set Source Zones to inside for rule 1.

Full Access
Question # 9

What must be automated to enhance the efficiency of a security team response?

A.

Changing all user passwords when a threat is detected

B.

Changing firewall settings for every detected threat, regardless of its severity

C.

Isolating affected systems and applying predefined security policies

D.

Sending an email to the entire organization when a threat is detected

Full Access
Question # 10

300-740 question answer

Refer to the exhibit. An engineer must troubleshoot an issue with excessive SSH traffic leaving the internal network between the hours of 18:00 and 08:00. The engineer applies a policy to the Cisco ASA firewall to block outbound SSH during the indicated hours; however, the issue persists. What should be done to meet the requirement?

A.

Change the time of rule 2.

B.

Delete rule 4

C.

Delete rule 3

D.

Change the time of rule 5

Full Access
Question # 11

An engineer must configure certificate-based authentication in a cloud-delivered Cisco Secure Firewall Management Center. Drag and drop the steps from left to right to manually enroll certificates on a Cisco Secure Firewall Threat Defense Virtual device.

300-740 question answer

Full Access
Question # 12

300-740 question answer

300-740 question answer

Refer to the exhibit. An engineer is investigating an issue by using Cisco Secure Cloud Analytics. The engineer confirms that the connections are unauthorized and informs the incident management team. Which two actions must be taken next? (Choose two.)

A.

Reinstall the host from a recent backup.

B.

Quarantine the host

C.

Reinstall the host from scratch.

D.

Create a firewall rule that has a source of linux-gcp-east-4c, a destination of Any, and a protocol of SSH.

E.

Create a firewall rule that has a source of Any, a destination of linux-gcp-east-4c, and a protocol of SSH.

Full Access
Question # 13

Which common strategy should be used to mitigate directory traversal attacks in a cloud environment?

A.

Use anti-cross-site request forgery tokens.

B.

Apply the principle of least privilege.

C.

Implement functionality validation.

D.

Limit file system permissions.

Full Access
Question # 14

What helps prevent drive-by compromise?

A.

Ad blockers

B.

VPN

C.

Incognito browsing

D.

Browsing known websites

Full Access
Question # 15

An engineer is configuring multifactor authentication using Duo. The implementation must use Duo Authentication Proxy and the Active Directory as an identity source. The company uses Azure and a local Active Directory. Which configuration is needed to meet the requirement?

A.

Configure the Identity Source as "SAML" on the Single Sign-On tab in the Duo Admin Panel, and configure the forwarding proxy as "local" for the Identity Source.

B.

Configure the Identity Source as "SAML" on the Single Sign-On tab, and configure the authentication proxy with the "[cloud]" section.

C.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab in the Duo Admin Panel, and configure the permit list to "Local database".

D.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab, and configure the authentication proxy with the "[sso]" section.

Full Access
Question # 16

300-740 question answer

Refer to the exhibit. An engineer is analyzing a Cisco Secure Firewall Management Center report. Which activity does the output verify?

A.

An HTTP response from IP address 10.1.104.101 was blocked.

B.

An HTTP request to IP address 10.1.113.7 was blocked.

C.

A DNS request to IP address 172.17.1.2 was blocked.

D.

A DNS response from IP address 10.1.108.100 was blocked.

Full Access
Question # 17

300-740 question answer

Refer to the exhibit. A security engineer must configure a posture policy in Cisco ISE to ensure that employee laptops have a critical patch for WannaCry installed before they can access the network. Which posture condition must the engineer configure?

A.

Patch Management Condition

B.

File Condition

C.

Anti-Virus Condition

D.

Anti-Malware Condition

Full Access
Question # 18

In the zero-trust network access model, which criteria is used for continuous verification to modify trust levels?

A.

System patching status

B.

Detected threat levels

C.

User and device behavior

D.

Network traffic patterns

Full Access