Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Last Attempt 300-740 Questions

Page: 2 / 5
Total 61 questions

Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers

Question 5

Refer to the exhibit. An engineer is investigating an unauthorized connection issue using Cisco Secure Cloud Analytics. Which two actions must be taken? (Choose two.)

Options:

A.

Reinstall the host from a recent backup.

B.

Inform the incident management team.

C.

Validate the IDS logs

D.

Block the unwanted IP addresses on the firewall

E.

Reinstall the host from scratch.

Question 6

Which types of algorithm does a web application firewall use for zero-day DDoS protection?

Options:

A.

Reactive and heuristic-based

B.

Stochastic and event-based

C.

Correlative and feedback-based

D.

Adaptive and behavioral-based

Question 7

Refer to the exhibit. An engineer must provide HTTPS access from the Google Cloud Platform virtual machine to the on-premises mail server. All other connections from the virtual machine to the mail server must be blocked. The indicated rules were applied to the firewall; however, the virtual machine cannot access the mail server. Which two actions should be performed on the firewall to meet the requirement? (Choose two.)

Options:

A.

Set IP address 192.168.200.10 as the destination in rule 1.

B.

Move up rule 2.

C.

Set IP address 20.1.1.1 as the source in rule 1.

D.

Configure a NAT rule.

E.

Configure a security group.

Question 8

Refer to the exhibit. An engineer must integrate Cisco Cloudlock with Salesforce in an organization. Despite the engineer's successful execution of the Salesforce integration with Cloudlock, the administrator still lacks the necessary visibility. What should be done to meet the requirement?

Options:

A.

From Salesforce, configure the service parameters.

B.

From Salesforce, enable the View All Data permission.

C.

From Cloudlock, configure the service parameters.

D.

From Cloudlock, enable the View All Data permission.

Page: 2 / 5
Total 61 questions