According to Cisco Security Reference Architecture, which solution provides threat intelligence and
malware analytics?
C
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
Cisco Talos is Cisco’s threat intelligence organization, delivering real-time threat intelligence and
malware analytics to help organizations detect and prevent threats before they impact the network.
According to the SCAZT guide, Talos provides comprehensive coverage of threat data including
signatures, indicators of compromise, and context-driven analytics. This intelligence feeds into Cisco
security platforms such as Cisco SecureX and Cisco Secure Endpoint to enhance detection,
investigation, and response capabilities. Talos is explicitly referenced in the Threat Response section
as the primary source of threat intelligence and malware analytics that supports cloud and endpoint
security frameworks.
Reference: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Study
Guide, Section 6: Threat Response, Pages 112-115.
Which types of algorithm does a web application firewall use for zero-day DDoS protection?
D
Explanation:
Comprehensive and Detailed Explanation From Exact Extract:
According to the SCAZT documentation, web application firewalls (WAFs) designed to protect against
zero-day Distributed Denial of Service (DDoS) attacks leverage adaptive and behavioral-based
algorithms. These algorithms dynamically analyze traffic patterns, baseline normal behavior, and
detect anomalies that could indicate novel or zero-day attacks. Unlike signature-based detection,
adaptive and behavioral methods adjust in real-time to emerging threats, learning from ongoing
traffic without relying on pre-defined rules. This proactive approach enables rapid detection and
mitigation of unknown DDoS vectors, critical for cloud and network security where threats evolve
constantly.
Reference: Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Study
Guide, Section 3: Network and Cloud Security, Pages 75-77.
An administrator must deploy an endpoint posture policy for all users. The organization wants to
have all endpoints checked against antimalware definitions and operating system updates and
ensure that the correct Secure Client modules are installed properly. How must the administrator
meet the requirements?
C
Refer to the exhibit.

Refer to the exhibit. An engineer must provide HTTPS access from the Google Cloud Platform virtual
machine to the on-premises mail server. All other connections from the virtual machine to the mail
server must be blocked. The indicated rules were applied to the firewall; however, the virtual
machine cannot access the mail server. Which two actions should be performed on the firewall to
meet the requirement? (Choose two.)
A, D
Refer to the exhibit.
Refer to the exhibit. A security engineer deployed Cisco Secure XDR, and during testing, the log entry
shows a security incident. Which action must the engineer take first?
C
Refer to the exhibit.
Refer to the exhibit. An engineer must create a policy in Cisco Secure Firewall Management Center to
prevent restricted users from being able to browse any business or mobile phone shopping websites.
The indicated policy was applied; however, the restricted users still can browse on the mobile phone
shopping websites during business hours. What should be done to meet the requirement?
D
Refer to the exhibit.
Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS
access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The
indicated rules were applied to the firewall; however, none of the virtual machines in AWS and
Google Cloud Platform are accessible. What should be done to meet the requirement?
A
Refer to the exhibit.

Refer to the exhibit. An engineer must connect an on-premises network to the public cloud using
Cisco Umbrella as a Cloud Access Security Broker. The indicated configuration was applied to router
R1; however, connectivity to Umbrella fails with this error: %OPENDNS-3-DNS_RES_FAILURE. Which
action must be taken on R1 to enable the connection?
B
Which mitigation technique does a web application firewall use to protect a web server against DDoS
attacks?
D
Refer to the exhibit.

Refer to the exhibit. An engineer is investigating an issue by using Cisco Secure Cloud Analytics. The
engineer confirms that the connections are unauthorized and informs the incident management
team. Which two actions must be taken next? (Choose two.)
B, E
In the zero-trust network access model, which criteria is used for continuous verification to modify
trust levels?
C
Refer to the exhibit.
Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to
block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed.
What should be done to meet the requirement?
B
Refer to the exhibit.
Refer to the exhibit. An engineer must analyze the Cisco Secure Cloud Analytics report. What is
occurring?
C
Refer to the exhibit.
Refer to the exhibit. An engineer must configure the Cisco ASA firewall to allow the client with IP
address 10.1.0.6 to access the Salesforce login page at https://www.salesforce.com. The indicated
configuration was applied to the firewall and public DNS 4.4.4.4 is used for name resolution;
however, the client still cannot access the URL. What should be done to meet the requirements?
A
Refer to the exhibit.
Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv1 VPN that will use
AES256 and SHA256 on a Cisco ASA firewall. The indicated configuration was applied to the firewall;
however, the tunnel fails to establish. Which two IKEv1 policy commands must be run to meet the
requirement? (Choose two.)
A, E