ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











An engineer has been tasked with using Cisco FMC to determine if files being sent through the network are malware. Which two configuration takes must be performed to achieve this file lookup?

(Choose two.)

A.

The Cisco FMC needs to include a SSL decryption policy.

A.

The Cisco FMC needs to include a SSL decryption policy.

Answers
B.

The Cisco FMC needs to connect to the Cisco AMP for Endpoints service.

B.

The Cisco FMC needs to connect to the Cisco AMP for Endpoints service.

Answers
C.

The Cisco FMC needs to connect to the Cisco ThreatGrid service directly for sandboxing.

C.

The Cisco FMC needs to connect to the Cisco ThreatGrid service directly for sandboxing.

Answers
D.

The Cisco FMC needs to connect with the FireAMP Cloud.

D.

The Cisco FMC needs to connect with the FireAMP Cloud.

Answers
E.

The Cisco FMC needs to include a file inspection policy for malware lookup.

E.

The Cisco FMC needs to include a file inspection policy for malware lookup.

Answers
Suggested answer: D, E

Which CLI command is used to control special handling of clientHello messages?

A.

system support ssl-client-hello-tuning

A.

system support ssl-client-hello-tuning

Answers
B.

system support ssl-client-hello-display

B.

system support ssl-client-hello-display

Answers
C.

system support ssl-client-hello-force-reset

C.

system support ssl-client-hello-force-reset

Answers
D.

system support ssl-client-hello-reset

D.

system support ssl-client-hello-reset

Answers
Suggested answer: D


An engineer is restoring a Cisco FTD configuration from a remote backup using the command restore remote-manager-backup location 1.1.1.1 admin /volume/home/admin BACKUP_Cisc394602314.zip on a Cisco FMG. After connecting to the repository, an error occurred that prevents the FTD device from accepting the backup file. What is the problem?

A.

The backup file is not in .cfg format.

A.

The backup file is not in .cfg format.

Answers
B.

The backup file is too large for the Cisco FTD device

B.

The backup file is too large for the Cisco FTD device

Answers
C.

The backup file extension was changed from tar to zip

C.

The backup file extension was changed from tar to zip

Answers
D.

The backup file was not enabled prior to being applied

D.

The backup file was not enabled prior to being applied

Answers
Suggested answer: C

An engineer has been tasked with providing disaster recovery for an organization's primary Cisco FMC. What must be done on the primary and secondary Cisco FMCs to ensure that a copy of the original corporate policy is available if the primary Cisco FMC fails?

A.

Restore the primary Cisco FMC backup configuration to the secondary Cisco FMC device when the primary device fails.

A.

Restore the primary Cisco FMC backup configuration to the secondary Cisco FMC device when the primary device fails.

Answers
B.

Configure high-availability in both the primary and secondary Cisco FMCs.

B.

Configure high-availability in both the primary and secondary Cisco FMCs.

Answers
C.

Connect the primary and secondary Cisco FMC devices with Category 6 cables of not more than 10 meters in length.

C.

Connect the primary and secondary Cisco FMC devices with Category 6 cables of not more than 10 meters in length.

Answers
D.

Place the active Cisco FMC device on the same trusted management network as the standby device.

D.

Place the active Cisco FMC device on the same trusted management network as the standby device.

Answers
Suggested answer: A

A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?

A.

Add the hash to the simple custom deletion list.

A.

Add the hash to the simple custom deletion list.

Answers
B.

Use regular expressions to block the malicious file.

B.

Use regular expressions to block the malicious file.

Answers
C.

Enable a personal firewall in the infected endpoint.

C.

Enable a personal firewall in the infected endpoint.

Answers
D.

Add the hash from the infected endpoint to the network block list.

D.

Add the hash from the infected endpoint to the network block list.

Answers
Suggested answer: A

An organization has a Cisco IPS running in inline mode and is inspecting traffic for malicious activity.

When traffic is received by the Cisco IRS, if it is not dropped, how does the traffic get to its destination?

A.

It is retransmitted from the Cisco IPS inline set.

A.

It is retransmitted from the Cisco IPS inline set.

Answers
B.

The packets are duplicated and a copy is sent to the destination.

B.

The packets are duplicated and a copy is sent to the destination.

Answers
C.

It is transmitted out of the Cisco IPS outside interface.

C.

It is transmitted out of the Cisco IPS outside interface.

Answers
D.

It is routed back to the Cisco ASA interfaces for transmission.

D.

It is routed back to the Cisco ASA interfaces for transmission.

Answers
Suggested answer: A

A network administrator is concerned about (he high number of malware files affecting users' machines. What must be done within the access control policy in Cisco FMC to address this concern?

A.

Create an intrusion policy and set the access control policy to block.

A.

Create an intrusion policy and set the access control policy to block.

Answers
B.

Create an intrusion policy and set the access control policy to allow.

B.

Create an intrusion policy and set the access control policy to allow.

Answers
C.

Create a file policy and set the access control policy to allow.

C.

Create a file policy and set the access control policy to allow.

Answers
D.

Create a file policy and set the access control policy to block.

D.

Create a file policy and set the access control policy to block.

Answers
Suggested answer: D

An engineer is investigating connectivity problems on Cisco Firepower that is using service group tags. Specific devices are not being tagged correctly, which is preventing clients from using the proper policies when going through the firewall How is this issue resolved?

A.

Use traceroute with advanced options.

A.

Use traceroute with advanced options.

Answers
B.

Use Wireshark with an IP subnet filter.

B.

Use Wireshark with an IP subnet filter.

Answers
C.

Use a packet capture with match criteria.

C.

Use a packet capture with match criteria.

Answers
D.

Use a packet sniffer with correct filtering

D.

Use a packet sniffer with correct filtering

Answers
Suggested answer: C

A connectivity issue is occurring between a client and a server which are communicating through a Cisco Firepower device While troubleshooting, a network administrator sees that traffic is reaching the server, but the client is not getting a response Which step must be taken to resolve this issue without initiating traffic from the client?

A.

Use packet-tracer to ensure that traffic is not being blocked by an access list.

A.

Use packet-tracer to ensure that traffic is not being blocked by an access list.

Answers
B.

Use packet capture to ensure that traffic is not being blocked by an access list.

B.

Use packet capture to ensure that traffic is not being blocked by an access list.

Answers
C.

Use packet capture to validate that the packet passes through the firewall and is NATed to the corrected IP address.

C.

Use packet capture to validate that the packet passes through the firewall and is NATed to the corrected IP address.

Answers
D.

Use packet-tracer to validate that the packet passes through the firewall and is NATed to the corrected IP address.

D.

Use packet-tracer to validate that the packet passes through the firewall and is NATed to the corrected IP address.

Answers
Suggested answer: D

An organization must be able to ingest NetFlow traffic from their Cisco FTD device to Cisco Stealthwatch for behavioral analysis. What must be configured on the Cisco FTD to meet this requirement?

A.

flexconfig object for NetFlow

A.

flexconfig object for NetFlow

Answers
B.

interface object to export NetFlow

B.

interface object to export NetFlow

Answers
C.

security intelligence object for NetFlow

C.

security intelligence object for NetFlow

Answers
D.

variable set object for NetFlow

D.

variable set object for NetFlow

Answers
Suggested answer: A
Total 326 questions
Go to page: of 33