Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Questions and Answers
Question 17
What must be automated to enhance the efficiency of a security team response?
Options:
A.
Changing all user passwords when a threat is detected
B.
Changing firewall settings for every detected threat, regardless of its severity
C.
Isolating affected systems and applying predefined security policies
D.
Sending an email to the entire organization when a threat is detected
Answer:
C
Explanation:
Automation of containment and response actions—such as isolating compromised endpoints and applying predefined security policies—is a critical capability of Cisco’s XDR and SecureX platform. According to SCAZT Section 6: Threat Response (Pages 112–117), automating threat containment allows security teams to rapidly limit the blast radius of incidents and improve mean time to respond (MTTR), without relying solely on manual intervention.
[Reference: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT), Section 6, Pages 112–117]
Question 18
Refer to the exhibit. An engineer must analyze a segmentation policy in Cisco Secure Workload. What is the result of applying the policy?
Options:
A.
The default catch-all rule is applied by using Rule #3.
B.
HR cannot use Telnet to connect to IT by using Rule #2.
C.
HR can use Telnet to connect to IT by using Rule #1.
D.
The explicit deny all rule is applied.
Answer:
B
Explanation:
The policy includes three rules under the Apps scope. Rule #1 allows HR to communicate with IT on TCP port 23 (Telnet), but it is marked as “Default.” Rule #2 denies the same HR-to-IT Telnet traffic and is marked as “Absolute,” which takes precedence over any default rule. In Cisco Secure Workload (Tetration), an “Absolute” rule will override both “Default” and inherited rules. Therefore, even though there’s an allow in Rule #1, the deny in Rule #2 prevents HR from using Telnet to connect to IT.
[Reference: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT), Section 5: Visibility and Assurance, Pages 95–98., ]