View Mode
Q: 11
Refer to the exhibit. 300-740 question 300-740 question Refer to the exhibit. An engineer must create a firewall policy to allow web server communication only. The indicated firewall policy was applied; however, a recent audit requires that all firewall policies be optimized. Which set of rules must be deleted?
Options
Q: 12
Refer to the exhibit. 300-740 question Refer to the exhibit. An engineer must enable access to Salesforce using Cisco Umbrella and Cisco Cloudlock. These actions were performed: From Salesforce, add the Cloudlock IP address to the allow list From Cloudlock, authorize Salesforce However, Salesforce access via Cloudlock is still unauthorized. What should be done to meet the requirements?
Options
Q: 13
A security analyst detects an employee endpoint making connections to a malicious IP on the internet and downloaded a file named Test0511127691C.pdf. The analyst discovers the machine is infected by trojan malware. What must the analyst do to mitigate the threat using Cisco Secure Endpoint?
Options
Q: 14
DRAG DROP Drag and drop the tasks from the left into order on the right to implement adding Duo multifactor authentication to Meraki Client VPN login. 300-740 question
Your Answer
Q: 15
Which web application firewall deployment in the Cisco Secure DDoS protects against application layer and volumetric attacks?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE