ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











An engineer is setting up a new Firepower deployment and is looking at the default FMC policies to start the implementation During the initial trial phase, the organization wants to test some common Snort rules while still allowing the majority of network traffic to pass Which default policy should be used?

A.

Maximum Detection

A.

Maximum Detection

Answers
B.

Security Over Connectivity

B.

Security Over Connectivity

Answers
C.

Balanced Security and Connectivity

C.

Balanced Security and Connectivity

Answers
D.

Connectivity Over Security

D.

Connectivity Over Security

Answers
Suggested answer: C

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/firepower/623/fdm/fptd-fdm-config-guide-623/fptd-fdm-intrusion.html

An engineer currently has a Cisco FTD device registered to the Cisco FMC and is assigned the address of 10 10.50.12. The organization is upgrading the addressing schemes and there is a requirement to convert the addresses to a format that provides an adequate amount of addresses on the network What should the engineer do to ensure that the new addressing takes effect and can be used for the Cisco FTD to Cisco FMC connection?

A.

Delete and reregister the device to Cisco FMC

A.

Delete and reregister the device to Cisco FMC

Answers
B.

Update the IP addresses from IFV4 to IPv6 without deleting the device from Cisco FMC

B.

Update the IP addresses from IFV4 to IPv6 without deleting the device from Cisco FMC

Answers
C.

Format and reregister the device to Cisco FMC.

C.

Format and reregister the device to Cisco FMC.

Answers
D.

Cisco FMC does not support devices that use IPv4 IP addresses.

D.

Cisco FMC does not support devices that use IPv4 IP addresses.

Answers
Suggested answer: A

A security engineer is configuring an Access Control Policy for multiple branch locations These locations share a common rule set and utilize a network object called INSIDE_NET which contains the locally significant internal network subnets at each location What technique will retain the policy consistency at each location but allow only the locally significant network subnet within the applicable rules?

A.

utilizing policy inheritance

A.

utilizing policy inheritance

Answers
B.

utilizing a dynamic ACP that updates from Cisco Talos

B.

utilizing a dynamic ACP that updates from Cisco Talos

Answers
C.

creating a unique ACP per device

C.

creating a unique ACP per device

Answers
D.

creating an ACP with an INSIDE_NET network object and object overrides

D.

creating an ACP with an INSIDE_NET network object and object overrides

Answers
Suggested answer: D

An engineer is troubleshooting application failures through a FTD deployment. While using the FMC CLI. it has been determined that the traffic in question is not matching the desired policy. What should be done to correct this?

A.

Use the system support firewall-engine-debug command to determine which rules the traffic matching and modify the rule accordingly

A.

Use the system support firewall-engine-debug command to determine which rules the traffic matching and modify the rule accordingly

Answers
B.

Use the system support application-identification-debug command to determine which rules the traffic matching and modify the rule accordingly

B.

Use the system support application-identification-debug command to determine which rules the traffic matching and modify the rule accordingly

Answers
C.

Use the system support firewall-engine-dump-user-f density-data command to change the policy and allow the application through the firewall.

C.

Use the system support firewall-engine-dump-user-f density-data command to change the policy and allow the application through the firewall.

Answers
D.

Use the system support network-options command to fine tune the policy.

D.

Use the system support network-options command to fine tune the policy.

Answers
Suggested answer: A

An administrator is attempting to remotely log into a switch in the data centre using SSH and is unable to connect. How does the administrator confirm that traffic is reaching the firewall?

A.

by running Wireshark on the administrator's PC

A.

by running Wireshark on the administrator's PC

Answers
B.

by performing a packet capture on the firewall.

B.

by performing a packet capture on the firewall.

Answers
C.

by running a packet tracer on the firewall.

C.

by running a packet tracer on the firewall.

Answers
D.

by attempting to access it from a different workstation.

D.

by attempting to access it from a different workstation.

Answers
Suggested answer: B

What is the advantage of having Cisco Firepower devices send events to Cisco Threat response via the security services exchange portal directly as opposed to using syslog?

A.

Firepower devices do not need to be connected to the internet.

A.

Firepower devices do not need to be connected to the internet.

Answers
B.

All types of Firepower devices are supported.

B.

All types of Firepower devices are supported.

Answers
C.

Supports all devices that are running supported versions of Firepower

C.

Supports all devices that are running supported versions of Firepower

Answers
D.

An on-premises proxy server does not need to set up and maintained

D.

An on-premises proxy server does not need to set up and maintained

Answers
Suggested answer: D

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/integrations/CTR/Firepower_and_Cisco_Threat_Response_Integration_Guide.pdf


An organization has noticed that malware was downloaded from a website that does not currently have a known bad reputation. How will this issue be addresses globally in the quickest way possible and with the least amount of impact?

A.

by denying outbound web access

A.

by denying outbound web access

Answers
B.

Cisco Talos will automatically update the policies.

B.

Cisco Talos will automatically update the policies.

Answers
C.

by Isolating the endpoint

C.

by Isolating the endpoint

Answers
D.

by creating a URL object in the policy to block the website

D.

by creating a URL object in the policy to block the website

Answers
Suggested answer: D

An administrator is working on a migration from Cisco ASA to the Cisco FTD appliance and needs to test the rules without disrupting the traffic. Which policy type should be used to configure the ASA rules during this phase of the migration?

A.

identity

A.

identity

Answers
B.

Intrusion

B.

Intrusion

Answers
C.

Access Control

C.

Access Control

Answers
D.

Prefilter

D.

Prefilter

Answers
Suggested answer: C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/migration-tool/migrationguide/ASA2FTD-with-FP-Migration-Tool/b_Migration_Guide_ASA2FTD_chapter_01011.html

Which two routing options are valid with Cisco FTD? (Choose Two)

A.

BGPv6

A.

BGPv6

Answers
B.

ECMP with up to three equal cost paths across multiple interfaces

B.

ECMP with up to three equal cost paths across multiple interfaces

Answers
C.

ECMP with up to three equal cost paths across a single interface

C.

ECMP with up to three equal cost paths across a single interface

Answers
D.

BGPv4 in transparent firewall mode

D.

BGPv4 in transparent firewall mode

Answers
E.

BGPv4 with nonstop forwarding

E.

BGPv4 with nonstop forwarding

Answers
Suggested answer: A, C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-configguide-v601/fpmc-config-guide-v60_chapter_01100011.html#ID-2101-0000000e

With Cisco FTD integrated routing and bridging, which interface does the bridge group use to communicate with a routed interface?

A.

switch virtual

A.

switch virtual

Answers
B.

bridge group member

B.

bridge group member

Answers
C.

bridge virtual

C.

bridge virtual

Answers
D.

subinterface

D.

subinterface

Answers
Suggested answer: C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html

Total 326 questions
Go to page: of 33