Pass the Cisco CCNP Security 300-740 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which common strategy should be used to mitigate directory traversal attacks in a cloud environment?

Options:

A.

Use anti-cross-site request forgery tokens.


B.

Apply the principle of least privilege.


C.

Implement functionality validation.


D.

Limit file system permissions.


Questions # 2:

What is a crucial component in the MITRE ATT&CK framework?

Options:

A.

Techniques for accessing credentials


B.

Incident response workflow


C.

Blueprint for a secure network architecture


D.

Best practices for user access management


Questions # 3:

What is associated with implementing Cisco zero-trust architecture?

Options:

A.

It verifies trust before granting access to resources.


B.

It focuses on perimeter-based security.


C.

It assumes that all network traffic is trustworthy.


D.

It provides the same security as the VPN technology.


Questions # 4:

What must be automated to enhance the efficiency of a security team response?

Options:

A.

Changing all user passwords when a threat is detected


B.

Changing firewall settings for every detected threat, regardless of its severity


C.

Isolating affected systems and applying predefined security policies


D.

Sending an email to the entire organization when a threat is detected


Questions # 5:

Question # 5

Refer to the exhibit. An engineer must configure SAML single sign-on in Cisco ISE to use Microsoft Azure AD as an identity provider. Drag and drop the steps from the left into the sequence on the right to configure Cisco ISE with SAML single sign-on.

Question # 5


Questions # 6:

Question # 6

Question # 6

Refer to the exhibit. An engineer is investigating an unauthorized connection issue using Cisco Secure Cloud Analytics. Which two actions must be taken? (Choose two.)

Options:

A.

Reinstall the host from a recent backup.


B.

Inform the incident management team.


C.

Validate the IDS logs


D.

Block the unwanted IP addresses on the firewall


E.

Reinstall the host from scratch.


Questions # 7:

Which concept is used in the Cisco SAFE key reference model?

Options:

A.

Secure Domains


B.

Cloud Edge


C.

Security Intelligence


D.

Threat Defense


Questions # 8:

An administrator received an incident report indicating suspicious activity of a user using a corporate device. The manager requested that the credentials of user user1@cisco.com be reset and synced via the Active Directory. Removing the account should be avoided and used for further investigation on data leak. Which configuration must the administrator apply on the Duo Admin Panel?

Options:

A.

Delete the user in the Users tab option and sync it with the domain controller.


B.

Quarantine the user from all the policies on the Policies tab, including associated devices.


C.

Request the password change on the Device tab on managed devices.


D.

Disable the account on the Users tab and reset the password from the Active Directory.


Questions # 9:

Question # 9

Refer to the exhibit. A security engineer deployed Cisco Secure XDR, and during testing, the log entry shows a security incident. Which action must the engineer take first?

Options:

A.

Uninstall the malware.


B.

Block IP address 10.77.17.45.


C.

Isolate the endpoint.


D.

Rebuild the endpoint.


Questions # 10:

Question # 10

Refer to the exhibit. An engineer must block internal users from accessing Facebook and Facebook Apps. All other access must be allowed. The indicated policy was created in Cisco Secure Firewall Management Center and deployed to the internet edge firewall; however, users still can access Facebook. Which two actions must be taken to meet the requirement? (Choose two.)

Options:

A.

Set Destination Zones to outside for rule 2.


B.

Set Source Zones to inside for rule 2.


C.

Set Applications to Facebook and Facebook Apps for rule 2.


D.

Set Destination Zones to outside for rule 1.


E.

Set Source Zones to inside for rule 1.


Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions