Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

300-740 Questions and Answers

Question # 6

Which types of algorithm does a web application firewall use for zero-day DDoS protection?

A.

Reactive and heuristic-based

B.

Stochastic and event-based

C.

Correlative and feedback-based

D.

Adaptive and behavioral-based

Full Access
Question # 7

Refer to the exhibit. An engineer must configure the Cisco ASA firewall to allow the client with IP address 10.1.0.6 to access the Salesforce login page at https://www.salesforce.com. The indicated configuration was applied to the firewall and public DNS 4.4.4.4 is used for name resolution; however, the client still cannot access the URL. What should be done to meet the requirements?

A.

Remove rule 3

B.

Move rule 5 to the top

C.

Remove rule 7

D.

Move rule 6 to the top

Full Access
Question # 8

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

Full Access
Question # 9

Refer to the exhibit. An engineer must configure a global allow list in Cisco Umbrella for the cisco.com domain. All other domains must be blocked. After creating a new policy and adding the cisco.com domain, the engineer attempts to access a site outside of cisco.com and is successful. Which additional Security Settings action must be taken to meet the requirement?

A.

Limit Content Access.

B.

Enforce SafeSearch.

C.

Enable Allow-Only Mode

D.

Apply Destination List.

Full Access
Question # 10

Refer to the exhibit. An engineer must implement a remote access VPN solution that provides user and device verification. The company uses Active Directory for user authentication and ID certificates for device identity. Users are currently able to connect using only a valid username and password, even if their computer is missing the required certificate.

Which command from the Cisco ASA tunnel-group completes the requirement of verifying device identity in addition to user identity?

A.

ldap-attribute-map PolicyAllow

B.

webvpn authorize-device

C.

authentication mfa

D.

authentication aaa certificate

Full Access
Question # 11

Refer to the exhibit. A security engineer deployed Cisco Secure XDR, and during testing, the log entry shows a security incident. Which action must the engineer take first?

A.

Uninstall the malware.

B.

Block IP address 10.77.17.45.

C.

Isolate the endpoint.

D.

Rebuild the endpoint.

Full Access
Question # 12

Refer to the exhibit. An engineer must provide HTTPS access from the Google Cloud Platform virtual machine to the on-premises mail server. All other connections from the virtual machine to the mail server must be blocked. The indicated rules were applied to the firewall; however, the virtual machine cannot access the mail server. Which two actions should be performed on the firewall to meet the requirement? (Choose two.)

A.

Set IP address 192.168.200.10 as the destination in rule 1.

B.

Move up rule 2.

C.

Set IP address 20.1.1.1 as the source in rule 1.

D.

Configure a NAT rule.

E.

Configure a security group.

Full Access
Question # 13

Refer to the exhibit. An engineer must connect an on-premises network to the public cloud using Cisco Umbrella as a Cloud Access Security Broker. The indicated configuration was applied to router R1; however, connectivity to Umbrella fails with this error: %OPENDNS-3-DNS_RES_FAILURE. Which action must be taken on R1 to enable the connection?

A.

Configure the Open DNS servers with the ip name-server command.

B.

Configure a DHCP scope using the ip dhcp pool command.

C.

Add the opendns in command to the interface configuration.

D.

Add the opendns out command to the interface configuration.

Full Access
Question # 14

Refer to the exhibit. An engineer must block internal users from accessing Facebook and Facebook Apps. All other access must be allowed. The indicated policy was created in Cisco Secure Firewall Management Center and deployed to the internet edge firewall; however, users still can access Facebook. Which two actions must be taken to meet the requirement? (Choose two.)

A.

Set Destination Zones to outside for rule 2.

B.

Set Source Zones to inside for rule 2.

C.

Set Applications to Facebook and Facebook Apps for rule 2.

D.

Set Destination Zones to outside for rule 1.

E.

Set Source Zones to inside for rule 1.

Full Access
Question # 15

Refer to the exhibit. An engineer must configure VPN load balancing across two Cisco ASA. The indicated configuration was applied to each firewall; however, the load-balancing encryption scheme fails to work. Which two commands must be run on each firewall to meet the requirements? (Choose two.)

A.

cluster port 9024

B.

crypto ikev1 policy 1

C.

hash sha-256

D.

encryption aes 256

E.

cluster encryption

Full Access
Question # 16

What helps prevent drive-by compromise?

A.

Ad blockers

B.

VPN

C.

Incognito browsing

D.

Browsing known websites

Full Access
Question # 17

Refer to the exhibit. An engineer must troubleshoot an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

A.

SYN flood attack toward the DNS server that has IP address 10.10.10.10

B.

DoS attack toward the 50.10.10.0/24 network from an internal IP address

C.

Ping of Death attack toward the host that has IP address 10.10.10.10

D.

TCP fingerprinting toward the 50.10.10.0/24 network

Full Access
Question # 18

According to the MITRE ATT&CK framework, which approach should be used to mitigate exploitation risks?

A.

Performing regular data backups and testing recovery procedures

B.

Keeping systems updated with the latest patches

C.

Consistently maintaining up-to-date antivirus software

D.

Ensuring that network traffic is closely monitored and controlled

Full Access