ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











An engineer must build redundancy into the network and traffic must continuously flow if a redundant switch in front of the firewall goes down. What must be configured to accomplish this task?

A.

redundant interfaces on the firewall cluster mode and switches

A.

redundant interfaces on the firewall cluster mode and switches

Answers
B.

redundant interfaces on the firewall noncluster mode and switches

B.

redundant interfaces on the firewall noncluster mode and switches

Answers
C.

vPC on the switches to the interface mode on the firewall duster

C.

vPC on the switches to the interface mode on the firewall duster

Answers
D.

vPC on the switches to the span EtherChannel on the firewall cluster

D.

vPC on the switches to the span EtherChannel on the firewall cluster

Answers
Suggested answer: D

Explanation:

Reference: https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2018/pdf/BRKSEC-2020.pdf

What is the advantage of having Cisco Firepower devices send events to Cisco Threat Response via the security services exchange portal directly as opposed to using syslog?

A.

All types of Cisco Firepower devices are supported.

A.

All types of Cisco Firepower devices are supported.

Answers
B.

An on-premises proxy server does not need to be set up and maintained.

B.

An on-premises proxy server does not need to be set up and maintained.

Answers
C.

Cisco Firepower devices do not need to be connected to the Internet.

C.

Cisco Firepower devices do not need to be connected to the Internet.

Answers
D.

Supports all devices that are running supported versions of Cisco Firepower.

D.

Supports all devices that are running supported versions of Cisco Firepower.

Answers
Suggested answer: B

A network administrator notices that inspection has been interrupted on all non-managed interfaces of a device. What is the cause of this?

A.

The value of the highest MTU assigned to any non-management interface was changed.

A.

The value of the highest MTU assigned to any non-management interface was changed.

Answers
B.

The value of the highest MSS assigned to any non-management interface was changed.

B.

The value of the highest MSS assigned to any non-management interface was changed.

Answers
C.

A passive interface was associated with a security zone.

C.

A passive interface was associated with a security zone.

Answers
D.

Multiple inline interface pairs were added to the same inline interface.

D.

Multiple inline interface pairs were added to the same inline interface.

Answers
Suggested answer: A

A network administrator is configuring Snort inspection policies and is seeing failed deployment messages in Cisco FMC. What information should the administrator generate for Cisco TAC to help troubleshoot?

A.

A "show tech" file for the device in question.

A.

A "show tech" file for the device in question.

Answers
B.

A "troubleshoot" file for the device in question.

B.

A "troubleshoot" file for the device in question.

Answers
C.

A "troubleshoot" file for the Cisco FMC.

C.

A "troubleshoot" file for the Cisco FMC.

Answers
D.

A "show tech" for the Cisco FMC.

D.

A "show tech" for the Cisco FMC.

Answers
Suggested answer: B

A network administrator needs to create a policy on Cisco Firepower to fast-path traffic to avoid Layer 7 inspection. The rate at which traffic is inspected must be optimized. What must be done to achieve this goal?

A.

Enable lhe FXOS for multi-instance.

A.

Enable lhe FXOS for multi-instance.

Answers
B.

Configure a prefilter policy.

B.

Configure a prefilter policy.

Answers
C.

Configure modular policy framework.

C.

Configure modular policy framework.

Answers
D.

Disable TCP inspection.

D.

Disable TCP inspection.

Answers
Suggested answer: B

A network engineer is tasked with minimising traffic interruption during peak traffic limes. When the SNORT inspection engine is overwhelmed, what must be configured to alleviate this issue?

A.

Enable IPS inline link state propagation

A.

Enable IPS inline link state propagation

Answers
B.

Enable Pre-filter policies before the SNORT engine failure.

B.

Enable Pre-filter policies before the SNORT engine failure.

Answers
C.

Set a Trust ALL access control policy.

C.

Set a Trust ALL access control policy.

Answers
D.

Enable Automatic Application Bypass.

D.

Enable Automatic Application Bypass.

Answers
Suggested answer: D

A VPN user is unable to conned lo web resources behind the Cisco FTD device terminating the connection. While troubleshooting, the network administrator determines that the DNS responses are not getting through the Cisco FTD What must be done to address this issue while still utilizing Snort IPS rules?

A.

Uncheck the "Drop when Inline" box in the intrusion policy to allow the traffic.

A.

Uncheck the "Drop when Inline" box in the intrusion policy to allow the traffic.

Answers
B.

Modify the Snort rules to allow legitimate DNS traffic to the VPN users.

B.

Modify the Snort rules to allow legitimate DNS traffic to the VPN users.

Answers
C.

Disable the intrusion rule threshes to optimize the Snort processing.

C.

Disable the intrusion rule threshes to optimize the Snort processing.

Answers
D.

Decrypt the packet after the VPN flow so the DNS queries are not inspected

D.

Decrypt the packet after the VPN flow so the DNS queries are not inspected

Answers
Suggested answer: B

An analyst is investigating a potentially compromised endpoint within the network and pulls a host report for the endpoint in question to collect metrics and documentation. What information should be taken from this report for the investigation?

A.

client applications by user, web applications, and user connections

A.

client applications by user, web applications, and user connections

Answers
B.

number of attacked machines, sources of the attack, and traffic patterns

B.

number of attacked machines, sources of the attack, and traffic patterns

Answers
C.

intrusion events, host connections, and user sessions

C.

intrusion events, host connections, and user sessions

Answers
D.

threat detections over time and application protocols transferring malware

D.

threat detections over time and application protocols transferring malware

Answers
Suggested answer: C

A company wants a solution to aggregate the capacity of two Cisco FTD devices to make the best use of resources such as bandwidth and connections per second. Which order of steps must be taken across the Cisco FTDs with Cisco FMC to meet this requirement?

A.

Configure the Cisco FTD interfaces, add members to FMC, configure cluster members in FMC, and create cluster in Cisco FMC.

A.

Configure the Cisco FTD interfaces, add members to FMC, configure cluster members in FMC, and create cluster in Cisco FMC.

Answers
B.

Add members to Cisco FMC, configure Cisco FTD interfaces in Cisco FMC. configure cluster members in Cisco FMC, create cluster in Cisco FMC. and configure cluster members in Cisco FMC.

B.

Add members to Cisco FMC, configure Cisco FTD interfaces in Cisco FMC. configure cluster members in Cisco FMC, create cluster in Cisco FMC. and configure cluster members in Cisco FMC.

Answers
C.

Configure the Cisco FTD interfaces and cluster members, add members to Cisco FMC. and create the cluster in Cisco FMC.

C.

Configure the Cisco FTD interfaces and cluster members, add members to Cisco FMC. and create the cluster in Cisco FMC.

Answers
D.

Add members to the Cisco FMC, configure Cisco FTD interfaces, create the cluster in Cisco FMC, and configure cluster members in Cisco FMC.

D.

Add members to the Cisco FMC, configure Cisco FTD interfaces, create the cluster in Cisco FMC, and configure cluster members in Cisco FMC.

Answers
Suggested answer: D

A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?

A.

Use regular expressions to block the malicious file.

A.

Use regular expressions to block the malicious file.

Answers
B.

Add the hash from the infected endpoint to the network block list.

B.

Add the hash from the infected endpoint to the network block list.

Answers
C.

Add the hash to the simple custom detection list.

C.

Add the hash to the simple custom detection list.

Answers
D.

Enable a personal firewall in the infected endpoint.

D.

Enable a personal firewall in the infected endpoint.

Answers
Suggested answer: C
Total 326 questions
Go to page: of 33