Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

300-740 Exam Dumps - Cisco CCNP Security Questions and Answers

Question # 4

Refer to the exhibit. An engineer configured a default segmentation policy in Cisco Secure Workload to block SMTP traffic. During testing, it is observed that the SMTP traffic is still allowed. Which action must the engineer take to complete the configuration?

Options:

A.

Add "port": [25, 25] to _rootScope

B.

Add _SMTPScope to provider_filter_ref

C.

Add "port": [25, 25] to _params

D.

Change consumer_filter_ref to: _SMTPScope

Buy Now
Question # 5

Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv2 VPN that will use SHA-512 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the tunnel fails to establish. Which command must be run to meet the requirement?

Options:

A.

integrity sha512

B.

protocol esp encryption sha512

C.

ipsec-proposal sha512

D.

encryption sha512

Buy Now
Question # 6

Refer to the exhibit. An engineer is analyzing a Cisco Secure Firewall Management Center report. Which activity does the output verify?

Options:

A.

An HTTP response from IP address 10.1.104.101 was blocked.

B.

An HTTP request to IP address 10.1.113.7 was blocked.

C.

A DNS request to IP address 172.17.1.2 was blocked.

D.

A DNS response from IP address 10.1.108.100 was blocked.

Buy Now
Question # 7

Which attack mitigation must be in place to prevent an attacker from authenticating to a service using a brute force attack?

Options:

A.

Forced password change every 6 months

B.

Use of a 100 ms delay between each authentication

C.

Use of a password manager

D.

Use of multifactor authentication for all accounts

Buy Now
Question # 8

What helps prevent drive-by compromise?

Options:

A.

Ad blockers

B.

VPN

C.

Incognito browsing

D.

Browsing known websites

Buy Now
Question # 9

Which concept is used in the Cisco SAFE key reference model?

Options:

A.

Secure Domains

B.

Cloud Edge

C.

Security Intelligence

D.

Threat Defense

Buy Now
Question # 10

What is associated with implementing Cisco zero-trust architecture?

Options:

A.

It verifies trust before granting access to resources.

B.

It focuses on perimeter-based security.

C.

It assumes that all network traffic is trustworthy.

D.

It provides the same security as the VPN technology.

Buy Now
Question # 11

Refer to the exhibit. An engineer must connect an on-premises network to the public cloud using Cisco Umbrella as a Cloud Access Security Broker. The indicated configuration was applied to router R1; however, connectivity to Umbrella fails with this error: %OPENDNS-3-DNS_RES_FAILURE. Which action must be taken on R1 to enable the connection?

Options:

A.

Configure the Open DNS servers with the ip name-server command.

B.

Configure a DHCP scope using the ip dhcp pool command.

C.

Add the opendns in command to the interface configuration.

D.

Add the opendns out command to the interface configuration.

Buy Now
Question # 12

According to Cisco Security Reference Architecture, which solution provides threat intelligence and malware analytics?

Options:

A.

Cisco pxGrid

B.

Cisco XDR

C.

Cisco Talos

D.

Cisco Umbrella

Buy Now
Question # 13

An administrator must deploy an endpoint posture policy for all users. The organization wants to have all endpoints checked against antimalware definitions and operating system updates and ensure that the correct Secure Client modules are installed properly. How must the administrator meet the requirements?

Options:

A.

Configure the WLC to provide local posture services, and configure Cisco ISE to receive the compliance verification from the WLC to be used in an authorization policy.

B.

Create an ASA Firewall posture policy, upload the Secure Client images to the NAD, and create a local client provisioning portal.

C.

Create the required posture policy within Cisco ISE, configure redirection on the NAD, and ensure that the client provisioning policy is correct.

D.

Identify the antimalware being used, create an endpoint script to ensure that it is updated, and send the update log to Cisco ISE for processing.

Buy Now
Exam Code: 300-740
Exam Name: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT)
Last Update: Jul 30, 2025
Questions: 61
300-740 pdf

300-740 PDF

$33.25  $94.99
300-740 Engine

300-740 Testing Engine

$38.5  $109.99
300-740 PDF + Engine

300-740 PDF + Testing Engine

$50.75  $144.99