ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











Network traffic coining from an organization's CEO must never be denied. Which access control policy configuration option should be used if the deployment engineer is not permitted to create a rule to allow all traffic?

A.

Configure firewall bypass.

A.

Configure firewall bypass.

Answers
B.

Change the intrusion policy from security to balance.

B.

Change the intrusion policy from security to balance.

Answers
C.

Configure a trust policy for the CEO.

C.

Configure a trust policy for the CEO.

Answers
D.

Create a NAT policy just for the CEO.

D.

Create a NAT policy just for the CEO.

Answers
Suggested answer: C

A network administrator discovers that a user connected to a file server and downloaded a malware file. The Cisc FMC generated an alert for the malware event, however the user still remained connected. Which Cisco APM file rule action within the Cisco FMC must be set to resolve this issue?

A.

Detect Files

A.

Detect Files

Answers
B.

Malware Cloud Lookup

B.

Malware Cloud Lookup

Answers
C.

Local Malware Analysis

C.

Local Malware Analysis

Answers
D.

Reset Connection

D.

Reset Connection

Answers
Suggested answer: D

An organization wants to secure traffic from their branch office to the headquarter building using Cisco Firepower devices, They want to ensure that their Cisco Firepower devices are not wasting resources on inspecting the VPN traffic.

What must be done to meet these requirements?

A.

Configure the Cisco Firepower devices to ignore the VPN traffic using prefilter policies

A.

Configure the Cisco Firepower devices to ignore the VPN traffic using prefilter policies

Answers
B.

Enable a flexconfig policy to re-classify VPN traffic so that it no longer appears as interesting traffic

B.

Enable a flexconfig policy to re-classify VPN traffic so that it no longer appears as interesting traffic

Answers
C.

Configure the Cisco Firepower devices to bypass the access control policies for VPN traffic.

C.

Configure the Cisco Firepower devices to bypass the access control policies for VPN traffic.

Answers
D.

Tune the intrusion policies in order to allow the VPN traffic through without inspection

D.

Tune the intrusion policies in order to allow the VPN traffic through without inspection

Answers
Suggested answer: C

Explanation:

When you configure the Cisco Firepower devices to bypass the access control policies for VPN traffic, thedevices will not inspect the VPN traffic and thus will not waste resources on it. This is the best option toensure that the VPN traffic is not wasting resources on the Cisco Firepower devices.

An organization has implemented Cisco Firepower without IPS capabilities and now wants to enable inspection for their traffic. They need to be able to detect protocol anomalies and utilize the Snort rule sets to detect malicious behaviour.

How is this accomplished?

A.

Modify the access control policy to redirect interesting traffic to the engine

A.

Modify the access control policy to redirect interesting traffic to the engine

Answers
B.

Modify the network discovery policy to detect new hosts to inspect

B.

Modify the network discovery policy to detect new hosts to inspect

Answers
C.

Modify the network analysis policy to process the packets for inspection

C.

Modify the network analysis policy to process the packets for inspection

Answers
D.

Modify the intrusion policy to determine the minimum severity of an event to inspect.

D.

Modify the intrusion policy to determine the minimum severity of an event to inspect.

Answers
Suggested answer: D

Refer to the exhibit.

An organization has an access control rule with the intention of sending all social media traffic for inspection After using the rule for some time, the administrator notices that the traffic is not being inspected, but is being automatically allowed What must be done to address this issue?

A.

Modify the selected application within the rule

A.

Modify the selected application within the rule

Answers
B.

Change the intrusion policy to connectivity over security.

B.

Change the intrusion policy to connectivity over security.

Answers
C.

Modify the rule action from trust to allow

C.

Modify the rule action from trust to allow

Answers
D.

Add the social network URLs to the block list

D.

Add the social network URLs to the block list

Answers
Suggested answer: A

Which feature within the Cisco FMC web interface allows for detecting, analyzing and blocking malware in network traffic?

A.

intrusion and file events

A.

intrusion and file events

Answers
B.

Cisco AMP for Endpoints

B.

Cisco AMP for Endpoints

Answers
C.

Cisco AMP for Networks

C.

Cisco AMP for Networks

Answers
D.

file policies

D.

file policies

Answers
Suggested answer: C

An administrator is setting up Cisco Firepower to send data to the Cisco Stealthwatch appliances. The NetFlow_Set_Parameters object is already created, but NetFlow is not being sent to the flow collector. What must be done to prevent this from occurring?

A.

Add the NetFlow_Send_Destination object to the configuration

A.

Add the NetFlow_Send_Destination object to the configuration

Answers
B.

Create a Security Intelligence object to send the data to Cisco Stealthwatch

B.

Create a Security Intelligence object to send the data to Cisco Stealthwatch

Answers
C.

Create a service identifier to enable the NetFlow service

C.

Create a service identifier to enable the NetFlow service

Answers
D.

Add the NetFlow_Add_Destination object to the configuration

D.

Add the NetFlow_Add_Destination object to the configuration

Answers
Suggested answer: B

There is an increased amount of traffic on the network and for compliance reasons, management needs visibility into the encrypted traffic What is a result of enabling TLS'SSL decryption to allow this visibility?

A.

It prompts the need for a corporate managed certificate

A.

It prompts the need for a corporate managed certificate

Answers
B.

It has minimal performance impact

B.

It has minimal performance impact

Answers
C.

It is not subject to any Privacy regulations

C.

It is not subject to any Privacy regulations

Answers
D.

It will fail if certificate pinning is not enforced

D.

It will fail if certificate pinning is not enforced

Answers
Suggested answer: A

A network engineer is receiving reports of users randomly getting disconnected from their corporate applications which traverses the data center FTD appliance Network monitoring tools show that the FTD appliance utilization is peaking above 90% of total capacity. What must be done in order to further analyze this issue?

A.

Use the Packet Export feature to save data onto external drives

A.

Use the Packet Export feature to save data onto external drives

Answers
B.

Use the Packet Capture feature to collect real-time network traffic

B.

Use the Packet Capture feature to collect real-time network traffic

Answers
C.

Use the Packet Tracer feature for traffic policy analysis

C.

Use the Packet Tracer feature for traffic policy analysis

Answers
D.

Use the Packet Analysis feature for capturing network data

D.

Use the Packet Analysis feature for capturing network data

Answers
Suggested answer: B

An engineer has been tasked with providing disaster recovery for an organization's primary Cisco FMC. What must be done on the primary and secondary Cisco FMCs to ensure that a copy of the original corporate policy is available if the primary Cisco FMC fails?

A.

Configure high-availability in both the primary and secondary Cisco FMCs

A.

Configure high-availability in both the primary and secondary Cisco FMCs

Answers
B.

Connect the primary and secondary Cisco FMC devices with Category 6 cables of not more than 10 meters in length.

B.

Connect the primary and secondary Cisco FMC devices with Category 6 cables of not more than 10 meters in length.

Answers
C.

Place the active Cisco FMC device on the same trusted management network as the standby device

C.

Place the active Cisco FMC device on the same trusted management network as the standby device

Answers
D.

Restore the primary Cisco FMC backup configuration to the secondary Cisco FMC device when the primary device fails

D.

Restore the primary Cisco FMC backup configuration to the secondary Cisco FMC device when the primary device fails

Answers
Suggested answer: D
Total 326 questions
Go to page: of 33