Questions for the 300-740 were updated on : Dec 01 ,2025
How does Cisco XDR perform threat prioritization by using its visibility across multiple platforms?
B
Refer to the exhibit.
Refer to the exhibit. An engineer configured a default segmentation policy in Cisco Secure Workload
to block SMTP traffic. During testing, it is observed that the SMTP traffic is still allowed. Which action
must the engineer take to complete the configuration?
C
A network administrator uses Cisco Umbrella to protect internal users from malicious content. A
customer is using an IPsec tunnel to connect to an Umbrella Organization. The administrator was
informed about a zero-day vulnerability that infects user machines and uploads sensitive data
through the RDP port. The administrator must ensure that no users are connected to the internet
using the RDP protocol. Which Umbrella configuration must the administrator apply?
B
Refer to the exhibit.
Refer to the exhibit. A security engineer must configure a posture policy in Cisco ISE to ensure that
employee laptops have a critical patch for WannaCry installed before they can access the network.
Which posture condition must the engineer configure?
B
Which web application firewall deployment in the Cisco Secure DDoS protects against application
layer and volumetric attacks?
C
DRAG DROP
Refer to the exhibit.
Refer to the exhibit. An engineer must configure multifactor authentication using the Duo Mobile
app to provide admin access to a Cisco Meraki switch. The engineer already configured Duo Mobile
and received an activation code. Drag and drop the steps from left to right to complete the
configuration.

According to the MITRE ATT&CK framework, which approach should be used to mitigate exploitation
risks?
B
Refer to the exhibit.
Refer to the exhibit. An engineer must implement a remote access VPN solution that provides user
and device verification. The company uses Active Directory for user authentication and ID certificates
for device identity. Users are currently able to connect using only a valid username and password,
even if their computer is missing the required certificate.
Which command from the Cisco ASA tunnel-group completes the requirement of verifying device
identity in addition to user identity?
B
Refer to the exhibit.
Refer to the exhibit. An engineer must analyze a segmentation policy in Cisco Secure Workload. What
is the result of applying the policy?
B
Refer to the exhibit.
Refer to the exhibit. An engineer must enable access to Salesforce using Cisco Umbrella and Cisco
Cloudlock. These actions were performed:
From Salesforce, add the Cloudlock IP address to the allow list
From Cloudlock, authorize Salesforce
However, Salesforce access via Cloudlock is still unauthorized. What should be done to meet the
requirements?
A
A recent InfraGard news release indicates the need to establish a risk ranking for all on-premises and
cloud services. The ACME Corporation already performs risk assessments for on-premises services
and has applied a risk ranking to them. However, the cloud services that were used lack risk rankings.
What Cisco Umbrella function should be used to meet the requirement?
D
Which SAFE component logically arranges the security capabilities into blueprints?
A
Refer to the exhibit.
Refer to the exhibit. An engineer must configure Cisco ASA so that the Secure Client deployment is
removed when the user laptop disconnects from the VPN. The indicated configuration was applied to
the Cisco ASA firewall. Which command must be run to meet the requirement?
D
What does the Cisco Telemetry Broker provide for telemetry data?
D
Refer to the exhibit.
Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv2 VPN that will use SHA-
512 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the
tunnel fails to establish. Which command must be run to meet the requirement?
C