Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 300-740 Questions and answers with ValidTests

Exam 300-740 All Questions
Exam 300-740 Premium Access

View all detail and faqs for the 300-740 exam

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Question # 1

Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed. What should be done to meet the requirement?

Options:

A.

Change consumer_filter_ref to HTTP Consumer.

B.

Add HTTP to 14_params.

C.

Decrease the priority of the template to 50.

D.

Increase the priority of the template to 200.

Expert Solution
Questions # 2:

What does the Cisco Telemetry Broker provide for telemetry data?

Options:

A.

Data analytics

B.

Data mining

C.

Data filtering

D.

Data brokering

Expert Solution
Questions # 3:

A network administrator uses Cisco Umbrella to protect internal users from malicious content. A customer is using an IPsec tunnel to connect to an Umbrella Organization. The administrator was informed about a zero-day vulnerability that infects user machines and uploads sensitive data through the RDP port. The administrator must ensure that no users are connected to the internet using the RDP protocol. Which Umbrella configuration must the administrator apply?

Options:

A.

Web policy to block Remote Desktop Manager application type

B.

Firewall policy and set port 3389 to be blocked for all outgoing traffic

C.

Data loss prevention policy to block all file uploads with RDP application mime type

D.

DNS policy to block Remote Desktop Manager application type

Expert Solution
Questions # 4:

Question # 4

Question # 4

Refer to the exhibit. An engineer is investigating an unauthorized connection issue using Cisco Secure Cloud Analytics. Which two actions must be taken? (Choose two.)

Options:

A.

Reinstall the host from a recent backup.

B.

Inform the incident management team.

C.

Validate the IDS logs

D.

Block the unwanted IP addresses on the firewall

E.

Reinstall the host from scratch.

Expert Solution
Questions # 5:

An engineer configures trusted endpoints with Active Directory with Device Health to determine if an endpoint complies with the policy posture. After a week, an alert is received by one user, reporting problems accessing an application. When the engineer verifies the authentication report, this error is found:

"Endpoint is not trusted because Cisco Secure Endpoint check failed, Check user's endpoint in Cisco Secure Endpoint."

Which action must the engineer take to permit access to the application again?

Options:

A.

Verify the Cisco Secure Endpoint admin panel and approve the access to the user on the Management tab after a complete virus check of the user's laptop.

B.

Verify the Trusted Endpoints policy to verify the status of the machine, and after a complete process of analysis, permit the machine to have access to the application.

C.

Verify the Duo admin panel, check the EndPoints tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

D.

Verify the Cisco Secure Endpoint admin panel, check the Inbox tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

Expert Solution
Questions # 6:

Question # 6

Question # 6

Refer to the exhibit. An engineer must connect an on-premises network to the public cloud using Cisco Umbrella as a Cloud Access Security Broker. The indicated configuration was applied to router R1; however, connectivity to Umbrella fails with this error: %OPENDNS-3-DNS_RES_FAILURE. Which action must be taken on R1 to enable the connection?

Options:

A.

Configure the Open DNS servers with the ip name-server command.

B.

Configure a DHCP scope using the ip dhcp pool command.

C.

Add the opendns in command to the interface configuration.

D.

Add the opendns out command to the interface configuration.

Expert Solution
Questions # 7:

What must be automated to enhance the efficiency of a security team response?

Options:

A.

Changing all user passwords when a threat is detected

B.

Changing firewall settings for every detected threat, regardless of its severity

C.

Isolating affected systems and applying predefined security policies

D.

Sending an email to the entire organization when a threat is detected

Expert Solution
Questions # 8:

Question # 8

Refer to the exhibit. An engineer must configure Duo SSO for Cisco Webex and add the Webex application to the Duo Access Gateway. Which two actions must be taken in Duo? (Choose two.)

Options:

A.

Upload the application XML metadata file.

B.

Upload the SAML application JSON file.

C.

Configure the Applications settings for Cisco Webex.

D.

Import the Identity Provider metadata.

E.

Add a new application to the Duo platform.

Expert Solution
Questions # 9:

Question # 9

Refer to the exhibit. An engineer must analyze the Cisco Secure Cloud Analytics report. What is occurring?

Options:

A.

Persistent remote-control connections

B.

Distributed DDoS attack

C.

Geographically unusual remote access

D.

Memory exhaustion attempt toward port 22

Expert Solution
Questions # 10:

Which mitigation technique does a web application firewall use to protect a web server against DDoS attacks?

Options:

A.

Source-specific ACL

B.

Standard ACL

C.

Packet filtering

D.

Rate-based rules

Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions