Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 2
Total 18 questions
Exam Code: 300-740                Update: Oct 15, 2025
Exam Name: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)

Cisco Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) 300-740 Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

Refer to the exhibit. An engineer must integrate Cisco Cloudlock with Salesforce in an organization. Despite the engineer's successful execution of the Salesforce integration with Cloudlock, the administrator still lacks the necessary visibility. What should be done to meet the requirement?

A.

From Salesforce, configure the service parameters.

B.

From Salesforce, enable the View All Data permission.

C.

From Cloudlock, configure the service parameters.

D.

From Cloudlock, enable the View All Data permission.

Question # 2

Refer to the exhibit. A security engineer must configure a posture policy in Cisco ISE to ensure that employee laptops have a critical patch for WannaCry installed before they can access the network. Which posture condition must the engineer configure?

A.

Patch Management Condition

B.

File Condition

C.

Anti-Virus Condition

D.

Anti-Malware Condition

Question # 3

An engineer must configure certificate-based authentication in a cloud-delivered Cisco Secure Firewall Management Center. Drag and drop the steps from left to right to manually enroll certificates on a Cisco Secure Firewall Threat Defense Virtual device.

Question # 4

Refer to the exhibit. An engineer is analyzing a Cisco Secure Firewall Management Center report. Which activity does the output verify?

A.

An HTTP response from IP address 10.1.104.101 was blocked.

B.

An HTTP request to IP address 10.1.113.7 was blocked.

C.

A DNS request to IP address 172.17.1.2 was blocked.

D.

A DNS response from IP address 10.1.108.100 was blocked.

Question # 5

An engineer configures trusted endpoints with Active Directory with Device Health to determine if an endpoint complies with the policy posture. After a week, an alert is received by one user, reporting problems accessing an application. When the engineer verifies the authentication report, this error is found:

"Endpoint is not trusted because Cisco Secure Endpoint check failed, Check user's endpoint in Cisco Secure Endpoint."

Which action must the engineer take to permit access to the application again?

A.

Verify the Cisco Secure Endpoint admin panel and approve the access to the user on the Management tab after a complete virus check of the user's laptop.

B.

Verify the Trusted Endpoints policy to verify the status of the machine, and after a complete process of analysis, permit the machine to have access to the application.

C.

Verify the Duo admin panel, check the EndPoints tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

D.

Verify the Cisco Secure Endpoint admin panel, check the Inbox tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

Question # 6

Refer to the exhibit. An engineer must provide HTTPS access from the Google Cloud Platform virtual machine to the on-premises mail server. All other connections from the virtual machine to the mail server must be blocked. The indicated rules were applied to the firewall; however, the virtual machine cannot access the mail server. Which two actions should be performed on the firewall to meet the requirement? (Choose two.)

A.

Set IP address 192.168.200.10 as the destination in rule 1.

B.

Move up rule 2.

C.

Set IP address 20.1.1.1 as the source in rule 1.

D.

Configure a NAT rule.

E.

Configure a security group.

Question # 7

An engineer is configuring multifactor authentication using Duo. The implementation must use Duo Authentication Proxy and the Active Directory as an identity source. The company uses Azure and a local Active Directory. Which configuration is needed to meet the requirement?

A.

Configure the Identity Source as "SAML" on the Single Sign-On tab in the Duo Admin Panel, and configure the forwarding proxy as "local" for the Identity Source.

B.

Configure the Identity Source as "SAML" on the Single Sign-On tab, and configure the authentication proxy with the "[cloud]" section.

C.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab in the Duo Admin Panel, and configure the permit list to "Local database".

D.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab, and configure the authentication proxy with the "[sso]" section.

Question # 8

Refer to the exhibit. An engineer must analyze the Cisco Secure Cloud Analytics report. What is occurring?

A.

Persistent remote-control connections

B.

Distributed DDoS attack

C.

Geographically unusual remote access

D.

Memory exhaustion attempt toward port 22

Question # 9

Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv2 VPN that will use SHA-512 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the tunnel fails to establish. Which command must be run to meet the requirement?

A.

integrity sha512

B.

protocol esp encryption sha512

C.

ipsec-proposal sha512

D.

encryption sha512

Question # 10

Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv1 VPN that will use AES256 and SHA256 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the tunnel fails to establish. Which two IKEv1 policy commands must be run to meet the requirement? (Choose two.)

A.

encryption aes-256

B.

ipsec-proposal sha-256-aes-256

C.

integrity aes-256

D.

ipsec-proposal AES256-SHA256

E.

hash sha-256

Page: 1 / 2
Total 18 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 16 Oct 2025