Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Cisco CCNP Security 300-740 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 300-740 Premium Access

View all detail and faqs for the 300-740 exam


382 Students Passed

88% Average Score

98% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Question # 1

Refer to the exhibit. An engineer must create a policy in Cisco Secure Firewall Management Center to prevent restricted users from being able to browse any business or mobile phone shopping websites. The indicated policy was applied; however, the restricted users still can browse on the mobile phone shopping websites during business hours. What should be done to meet the requirement?

Options:

A.

Set Dest Zones to Business Mobile Phones Shopping.

B.

Set Dest Networks to Business Mobile Phones Shopping.

C.

Set Time Range for rule 4 of Access Controlled Groups to All.

D.

Move rule 4 Access Controlled Groups to the top.

Questions # 2:

What does the MITRE ATT&CK framework catalog?

Options:

A.

Techniques utilized in cyber attacks

B.

Patterns of system vulnerabilities

C.

Models of threat intelligence sharing

D.

Standards for information security management

Questions # 3:

An engineer must configure certificate-based authentication in a cloud-delivered Cisco Secure Firewall Management Center. Drag and drop the steps from left to right to manually enroll certificates on a Cisco Secure Firewall Threat Defense Virtual device.

Question # 3

Options:

Questions # 4:

Question # 4

Refer to the exhibit. An engineer is analyzing a Cisco Secure Firewall Management Center report. Which activity does the output verify?

Options:

A.

An HTTP response from IP address 10.1.104.101 was blocked.

B.

An HTTP request to IP address 10.1.113.7 was blocked.

C.

A DNS request to IP address 172.17.1.2 was blocked.

D.

A DNS response from IP address 10.1.108.100 was blocked.

Questions # 5:

Question # 5

Refer to the exhibit. An engineer must configure the Cisco ASA firewall to allow the client with IP address 10.1.0.6 to access the Salesforce login page at https://www.salesforce.com. The indicated configuration was applied to the firewall and public DNS 4.4.4.4 is used for name resolution; however, the client still cannot access the URL. What should be done to meet the requirements?

Options:

A.

Remove rule 3

B.

Move rule 5 to the top

C.

Remove rule 7

D.

Move rule 6 to the top

Questions # 6:

What must be automated to enhance the efficiency of a security team response?

Options:

A.

Changing all user passwords when a threat is detected

B.

Changing firewall settings for every detected threat, regardless of its severity

C.

Isolating affected systems and applying predefined security policies

D.

Sending an email to the entire organization when a threat is detected

Questions # 7:

Question # 7

Refer to the exhibit. An engineer must troubleshoot an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

Options:

A.

SYN flood attack toward the DNS server that has IP address 10.10.10.10

B.

DoS attack toward the 50.10.10.0/24 network from an internal IP address

C.

Ping of Death attack toward the host that has IP address 10.10.10.10

D.

TCP fingerprinting toward the 50.10.10.0/24 network

Questions # 8:

An engineer configures trusted endpoints with Active Directory with Device Health to determine if an endpoint complies with the policy posture. After a week, an alert is received by one user, reporting problems accessing an application. When the engineer verifies the authentication report, this error is found:

"Endpoint is not trusted because Cisco Secure Endpoint check failed, Check user's endpoint in Cisco Secure Endpoint."

Which action must the engineer take to permit access to the application again?

Options:

A.

Verify the Cisco Secure Endpoint admin panel and approve the access to the user on the Management tab after a complete virus check of the user's laptop.

B.

Verify the Trusted Endpoints policy to verify the status of the machine, and after a complete process of analysis, permit the machine to have access to the application.

C.

Verify the Duo admin panel, check the EndPoints tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

D.

Verify the Cisco Secure Endpoint admin panel, check the Inbox tab, verify the status of the machine, and after a complete process of analysis, mark the computer as Resolved to permit the user to authenticate again.

Questions # 9:

Question # 9

Refer to the exhibit. A security engineer must configure a posture policy in Cisco ISE to ensure that employee laptops have a critical patch for WannaCry installed before they can access the network. Which posture condition must the engineer configure?

Options:

A.

Patch Management Condition

B.

File Condition

C.

Anti-Virus Condition

D.

Anti-Malware Condition

Questions # 10:

Question # 10

Refer to the exhibit. An engineer configured a default segmentation policy in Cisco Secure Workload to block SMTP traffic. During testing, it is observed that the SMTP traffic is still allowed. Which action must the engineer take to complete the configuration?

Options:

A.

Add "port": [25, 25] to _rootScope

B.

Add _SMTPScope to provider_filter_ref

C.

Add "port": [25, 25] to _params

D.

Change consumer_filter_ref to: _SMTPScope

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.