Cisco 300-710 Practice Test - Questions Answers, Page 12
List of questions
Related questions
Network traffic coining from an organization's CEO must never be denied. Which access control policy configuration option should be used if the deployment engineer is not permitted to create a rule to allow all traffic?
Configure firewall bypass.
Change the intrusion policy from security to balance.
Configure a trust policy for the CEO.
Create a NAT policy just for the CEO.
A network administrator discovers that a user connected to a file server and downloaded a malware file. The Cisc FMC generated an alert for the malware event, however the user still remained connected. Which Cisco APM file rule action within the Cisco FMC must be set to resolve this issue?
Detect Files
Malware Cloud Lookup
Local Malware Analysis
Reset Connection
An organization wants to secure traffic from their branch office to the headquarter building using Cisco Firepower devices, They want to ensure that their Cisco Firepower devices are not wasting resources on inspecting the VPN traffic.
What must be done to meet these requirements?
Configure the Cisco Firepower devices to ignore the VPN traffic using prefilter policies
Enable a flexconfig policy to re-classify VPN traffic so that it no longer appears as interesting traffic
Configure the Cisco Firepower devices to bypass the access control policies for VPN traffic.
Tune the intrusion policies in order to allow the VPN traffic through without inspection
An organization has implemented Cisco Firepower without IPS capabilities and now wants to enable inspection for their traffic. They need to be able to detect protocol anomalies and utilize the Snort rule sets to detect malicious behaviour.
How is this accomplished?
Modify the access control policy to redirect interesting traffic to the engine
Modify the network discovery policy to detect new hosts to inspect
Modify the network analysis policy to process the packets for inspection
Modify the intrusion policy to determine the minimum severity of an event to inspect.
Refer to the exhibit.
An organization has an access control rule with the intention of sending all social media traffic for inspection After using the rule for some time, the administrator notices that the traffic is not being inspected, but is being automatically allowed What must be done to address this issue?
Modify the selected application within the rule
Change the intrusion policy to connectivity over security.
Modify the rule action from trust to allow
Add the social network URLs to the block list
Which feature within the Cisco FMC web interface allows for detecting, analyzing and blocking malware in network traffic?
intrusion and file events
Cisco AMP for Endpoints
Cisco AMP for Networks
file policies
An administrator is setting up Cisco Firepower to send data to the Cisco Stealthwatch appliances. The NetFlow_Set_Parameters object is already created, but NetFlow is not being sent to the flow collector. What must be done to prevent this from occurring?
Add the NetFlow_Send_Destination object to the configuration
Create a Security Intelligence object to send the data to Cisco Stealthwatch
Create a service identifier to enable the NetFlow service
Add the NetFlow_Add_Destination object to the configuration
There is an increased amount of traffic on the network and for compliance reasons, management needs visibility into the encrypted traffic What is a result of enabling TLS'SSL decryption to allow this visibility?
It prompts the need for a corporate managed certificate
It has minimal performance impact
It is not subject to any Privacy regulations
It will fail if certificate pinning is not enforced
A network engineer is receiving reports of users randomly getting disconnected from their corporate applications which traverses the data center FTD appliance Network monitoring tools show that the FTD appliance utilization is peaking above 90% of total capacity. What must be done in order to further analyze this issue?
Use the Packet Export feature to save data onto external drives
Use the Packet Capture feature to collect real-time network traffic
Use the Packet Tracer feature for traffic policy analysis
Use the Packet Analysis feature for capturing network data
An engineer has been tasked with providing disaster recovery for an organization's primary Cisco FMC. What must be done on the primary and secondary Cisco FMCs to ensure that a copy of the original corporate policy is available if the primary Cisco FMC fails?
Configure high-availability in both the primary and secondary Cisco FMCs
Connect the primary and secondary Cisco FMC devices with Category 6 cables of not more than 10 meters in length.
Place the active Cisco FMC device on the same trusted management network as the standby device
Restore the primary Cisco FMC backup configuration to the secondary Cisco FMC device when the primary device fails
Question