ExamGecko
Home / Cisco / 300-710 / List of questions
Ask Question

Cisco 300-710 Practice Test - Questions Answers, Page 15

Add to Whishlist

List of questions

Question 141

Report Export Collapse

An engineer has been tasked with using Cisco FMC to determine if files being sent through the network are malware. Which two configuration takes must be performed to achieve this file lookup?

(Choose two.)

Become a Premium Member for full access
  Unlock Premium Member

Question 142

Report Export Collapse

Which CLI command is used to control special handling of clientHello messages?

Become a Premium Member for full access
  Unlock Premium Member

Question 143

Report Export Collapse


An engineer is restoring a Cisco FTD configuration from a remote backup using the command restore remote-manager-backup location 1.1.1.1 admin /volume/home/admin BACKUP_Cisc394602314.zip on a Cisco FMG. After connecting to the repository, an error occurred that prevents the FTD device from accepting the backup file. What is the problem?

Become a Premium Member for full access
  Unlock Premium Member

Question 144

Report Export Collapse

An engineer has been tasked with providing disaster recovery for an organization's primary Cisco FMC. What must be done on the primary and secondary Cisco FMCs to ensure that a copy of the original corporate policy is available if the primary Cisco FMC fails?

Become a Premium Member for full access
  Unlock Premium Member

Question 145

Report Export Collapse

A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?

Become a Premium Member for full access
  Unlock Premium Member

Question 146

Report Export Collapse

An organization has a Cisco IPS running in inline mode and is inspecting traffic for malicious activity.

When traffic is received by the Cisco IRS, if it is not dropped, how does the traffic get to its destination?

Become a Premium Member for full access
  Unlock Premium Member

Question 147

Report Export Collapse

A network administrator is concerned about (he high number of malware files affecting users' machines. What must be done within the access control policy in Cisco FMC to address this concern?

Become a Premium Member for full access
  Unlock Premium Member

Question 148

Report Export Collapse

An engineer is investigating connectivity problems on Cisco Firepower that is using service group tags. Specific devices are not being tagged correctly, which is preventing clients from using the proper policies when going through the firewall How is this issue resolved?

Become a Premium Member for full access
  Unlock Premium Member

Question 149

Report Export Collapse

A connectivity issue is occurring between a client and a server which are communicating through a Cisco Firepower device While troubleshooting, a network administrator sees that traffic is reaching the server, but the client is not getting a response Which step must be taken to resolve this issue without initiating traffic from the client?

Become a Premium Member for full access
  Unlock Premium Member

Question 150

Report Export Collapse

An organization must be able to ingest NetFlow traffic from their Cisco FTD device to Cisco Stealthwatch for behavioral analysis. What must be configured on the Cisco FTD to meet this requirement?

Become a Premium Member for full access
  Unlock Premium Member
Total 326 questions
Go to page: of 33
Search

Related questions