ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











While configuring FTD, a network engineer wants to ensure that traffic passing through the appliance does not require routing or Vlan rewriting. Which interface mode should the engineer implement to accomplish this task?

A.

passive

A.

passive

Answers
B.

transparent

B.

transparent

Answers
C.

Inline tap

C.

Inline tap

Answers
D.

Inline set

D.

Inline set

Answers
Suggested answer: B

The event dashboard within the Cisco FMC has been inundated with low priority intrusion drop events, which are overshadowing high priority events. An engineer has been tasked with reviewing the policies and reducing the low priority events. Which action should be configured to accomplish this task?

A.

generate events

A.

generate events

Answers
B.

drop packet

B.

drop packet

Answers
C.

drop connection

C.

drop connection

Answers
D.

drop and generate

D.

drop and generate

Answers
Suggested answer: B

Explanation:

Reference"

https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-configguide-v62/working_with_intrusion_events.html

An engineer is configuring a cisco FTD appliance in IPS-only mode and needs to utilize fail-to-wire interfaces. Which interface mode should be used to meet these requirements?

A.

transparent

A.

transparent

Answers
B.

routed

B.

routed

Answers
C.

passive

C.

passive

Answers
D.

inline set

D.

inline set

Answers
Suggested answer: D

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-configguide-v63/inline_sets_and_passive_interfaces_for_firepower_threat_defense.html

Which two considerations must be made when deleting and re-adding devices while managing them via Cisco FMC (Choose two).

A.

Before re-adding the device In Cisco FMC, the manager must be added back.

A.

Before re-adding the device In Cisco FMC, the manager must be added back.

Answers
B.

The Cisco FMC web interface prompts users to re-apply access control policies.

B.

The Cisco FMC web interface prompts users to re-apply access control policies.

Answers
C.

Once a device has been deleted, It must be reconfigured before it is re-added to the Cisco FMC.

C.

Once a device has been deleted, It must be reconfigured before it is re-added to the Cisco FMC.

Answers
D.

An option to re-apply NAT and VPN policies during registration is available, so users do not need to re-apply the polices after registration is completed.

D.

An option to re-apply NAT and VPN policies during registration is available, so users do not need to re-apply the polices after registration is completed.

Answers
E.

There is no option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the policies after registration is completed.

E.

There is no option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the policies after registration is completed.

Answers
Suggested answer: B, E

Refer to the exhibit.

An administrator is looking at some of the reporting capabilities for Cisco Firepower and noticed this section of the Network Risk report showing a lot of SSL activity that cloud be used for evasion. Which action will mitigate this risk?

A.

Use SSL decryption to analyze the packets.

A.

Use SSL decryption to analyze the packets.

Answers
B.

Use encrypted traffic analytics to detect attacks

B.

Use encrypted traffic analytics to detect attacks

Answers
C.

Use Cisco AMP for Endpoints to block all SSL connection

C.

Use Cisco AMP for Endpoints to block all SSL connection

Answers
D.

Use Cisco Tetration to track SSL connections to servers.

D.

Use Cisco Tetration to track SSL connections to servers.

Answers
Suggested answer: A

An engineer is attempting to add a new FTD device to their FMC behind a NAT device with a NAT ID of ACME001 and a password of Cisco388267669. Which command set must be used in order to accomplish this?

A.

configure manager add ACME001 <registration key> <FMC IP>

A.

configure manager add ACME001 <registration key> <FMC IP>

Answers
B.

configure manager add <FMC IP> ACME0O1 <registration key>

B.

configure manager add <FMC IP> ACME0O1 <registration key>

Answers
C.

configure manager add DONTRESOLVE <FMC IP> AMCE001 <registration key>

C.

configure manager add DONTRESOLVE <FMC IP> AMCE001 <registration key>

Answers
D.

configure manager add <FMC IP> registration key> ACME001

D.

configure manager add <FMC IP> registration key> ACME001

Answers
Suggested answer: D

A user within an organization opened a malicious file on a workstation which in turn caused a ransomware attack on the network. What should be configured within the Cisco FMC to ensure the file is tested for viruses on a sandbox system?

A.

Capacity handling

A.

Capacity handling

Answers
B.

Local malware analysis

B.

Local malware analysis

Answers
C.

Spere analysis

C.

Spere analysis

Answers
D.

Dynamic analysis

D.

Dynamic analysis

Answers
Suggested answer: D

Refer to the exhibit.

What must be done to fix access to this website while preventing the same communication to all other websites?

A.

Create an intrusion policy rule to have Snort allow port 80 to only 172.1.1 50.

A.

Create an intrusion policy rule to have Snort allow port 80 to only 172.1.1 50.

Answers
B.

Create an access control policy rule to allow port 80 to only 172.1.1 50.

B.

Create an access control policy rule to allow port 80 to only 172.1.1 50.

Answers
C.

Create an intrusion policy rule to have Snort allow port 443 to only 172.1.1.50

C.

Create an intrusion policy rule to have Snort allow port 443 to only 172.1.1.50

Answers
D.

Create an access control policy rule to allow port 443 to only 172.1.1 50

D.

Create an access control policy rule to allow port 443 to only 172.1.1 50

Answers
Suggested answer: B

A network administrator is seeing an unknown verdict for a file detected by Cisco FTD. Which malware policy configuration option must be selected in order to further analyse the file in the Talos cloud?

A.

Spero analysis

A.

Spero analysis

Answers
B.

Malware analysis

B.

Malware analysis

Answers
C.

Dynamic analysis

C.

Dynamic analysis

Answers
D.

Sandbox analysis

D.

Sandbox analysis

Answers
Suggested answer: B

Administrator is configuring SNORT inspection policies and is seeing failed deployment messages in Cisco FMC . What information should the administrator generate for Cisco TAC to help troubleshoot?

A.

A Troubleshoot" file for the device in question.

A.

A Troubleshoot" file for the device in question.

Answers
B.

A "show tech" file for the device in question

B.

A "show tech" file for the device in question

Answers
C.

A "show tech" for the Cisco FMC.

C.

A "show tech" for the Cisco FMC.

Answers
D.

A "troubleshoot" file for the Cisco FMC

D.

A "troubleshoot" file for the Cisco FMC

Answers
Suggested answer: A
Total 326 questions
Go to page: of 33