Cisco 300-710 Practice Test - Questions Answers, Page 10
List of questions
Related questions
An engineer is setting up a new Firepower deployment and is looking at the default FMC policies to start the implementation During the initial trial phase, the organization wants to test some common Snort rules while still allowing the majority of network traffic to pass Which default policy should be used?
Maximum Detection
Security Over Connectivity
Balanced Security and Connectivity
Connectivity Over Security
An engineer currently has a Cisco FTD device registered to the Cisco FMC and is assigned the address of 10 10.50.12. The organization is upgrading the addressing schemes and there is a requirement to convert the addresses to a format that provides an adequate amount of addresses on the network What should the engineer do to ensure that the new addressing takes effect and can be used for the Cisco FTD to Cisco FMC connection?
Delete and reregister the device to Cisco FMC
Update the IP addresses from IFV4 to IPv6 without deleting the device from Cisco FMC
Format and reregister the device to Cisco FMC.
Cisco FMC does not support devices that use IPv4 IP addresses.
A security engineer is configuring an Access Control Policy for multiple branch locations These locations share a common rule set and utilize a network object called INSIDE_NET which contains the locally significant internal network subnets at each location What technique will retain the policy consistency at each location but allow only the locally significant network subnet within the applicable rules?
utilizing policy inheritance
utilizing a dynamic ACP that updates from Cisco Talos
creating a unique ACP per device
creating an ACP with an INSIDE_NET network object and object overrides
An engineer is troubleshooting application failures through a FTD deployment. While using the FMC CLI. it has been determined that the traffic in question is not matching the desired policy. What should be done to correct this?
Use the system support firewall-engine-debug command to determine which rules the traffic matching and modify the rule accordingly
Use the system support application-identification-debug command to determine which rules the traffic matching and modify the rule accordingly
Use the system support firewall-engine-dump-user-f density-data command to change the policy and allow the application through the firewall.
Use the system support network-options command to fine tune the policy.
An administrator is attempting to remotely log into a switch in the data centre using SSH and is unable to connect. How does the administrator confirm that traffic is reaching the firewall?
by running Wireshark on the administrator's PC
by performing a packet capture on the firewall.
by running a packet tracer on the firewall.
by attempting to access it from a different workstation.
What is the advantage of having Cisco Firepower devices send events to Cisco Threat response via the security services exchange portal directly as opposed to using syslog?
Firepower devices do not need to be connected to the internet.
All types of Firepower devices are supported.
Supports all devices that are running supported versions of Firepower
An on-premises proxy server does not need to set up and maintained
An organization has noticed that malware was downloaded from a website that does not currently have a known bad reputation. How will this issue be addresses globally in the quickest way possible and with the least amount of impact?
by denying outbound web access
Cisco Talos will automatically update the policies.
by Isolating the endpoint
by creating a URL object in the policy to block the website
An administrator is working on a migration from Cisco ASA to the Cisco FTD appliance and needs to test the rules without disrupting the traffic. Which policy type should be used to configure the ASA rules during this phase of the migration?
identity
Intrusion
Access Control
Prefilter
Which two routing options are valid with Cisco FTD? (Choose Two)
BGPv6
ECMP with up to three equal cost paths across multiple interfaces
ECMP with up to three equal cost paths across a single interface
BGPv4 in transparent firewall mode
BGPv4 with nonstop forwarding
With Cisco FTD integrated routing and bridging, which interface does the bridge group use to communicate with a routed interface?
switch virtual
bridge group member
bridge virtual
subinterface
Question