ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 18

Question list
Search
Search

List of questions

Search

Related questions











An engineer wants to connect a single IP subnet through a Cisco FTD firewall and enforce policy.

There is a requirement to present the internal IP subnet to the outside as a different IP address.

What must be configured to meet these requirements?

A.

Configure the downstream router to perform NAT.

A.

Configure the downstream router to perform NAT.

Answers
B.

Configure the upstream router to perform NAT.

B.

Configure the upstream router to perform NAT.

Answers
C.

Configure the Cisco FTD firewall in routed mode with NAT enabled.

C.

Configure the Cisco FTD firewall in routed mode with NAT enabled.

Answers
D.

Configure the Cisco FTD firewall in transparent mode with NAT enabled.

D.

Configure the Cisco FTD firewall in transparent mode with NAT enabled.

Answers
Suggested answer: C

Upon detecting a flagrant threat on an endpoint, which two technologies instruct Cisco Identity Services Engine to contain the infected endpoint either manually or automatically? (Choose two.)

A.

Cisco ASA 5500 Series

A.

Cisco ASA 5500 Series

Answers
B.

Cisco FMC

B.

Cisco FMC

Answers
C.

Cisco AMP

C.

Cisco AMP

Answers
D.

Cisco Stealthwatch

D.

Cisco Stealthwatch

Answers
E.

Cisco ASR 7200 Series

E.

Cisco ASR 7200 Series

Answers
Suggested answer: C, D

An analyst using the security analyst account permissions is trying to view the Correlations Events Widget but is not able to access it. However, other dashboards are accessible. Why is this occurring?

A.

An API restriction within the Cisco FMC is preventing the widget from displaying.

A.

An API restriction within the Cisco FMC is preventing the widget from displaying.

Answers
B.

The widget is configured to display only when active events are present.

B.

The widget is configured to display only when active events are present.

Answers
C.

The widget is not configured within the Cisco FMC.

C.

The widget is not configured within the Cisco FMC.

Answers
D.

The security analyst role does not have permission to view this widget.

D.

The security analyst role does not have permission to view this widget.

Answers
Suggested answer: C

A network administrator configured a NAT policy that translates a public IP address to an internal web server IP address. An access policy has also been created that allows any source to reach the public IP address on port 80. The web server is still not reachable from the Internet on port 80.

Which configuration change is needed?

A.

The intrusion policy must be disabled for port 80.

A.

The intrusion policy must be disabled for port 80.

Answers
B.

The access policy rule must be configured for the action trust.

B.

The access policy rule must be configured for the action trust.

Answers
C.

The NAT policy must be modified to translate the source IP address as well as destination IP address.

C.

The NAT policy must be modified to translate the source IP address as well as destination IP address.

Answers
D.

The access policy must allow traffic to the internal web server IP address.

D.

The access policy must allow traffic to the internal web server IP address.

Answers
Suggested answer: D

An engineer must configure a Cisco FMC dashboard in a child domain. Which action must be taken so that the dashboard is visible to the parent domain?

A.

Add a separate tab.

A.

Add a separate tab.

Answers
B.

Adjust policy inheritance settings.

B.

Adjust policy inheritance settings.

Answers
C.

Add a separate widget.

C.

Add a separate widget.

Answers
D.

Create a copy of the dashboard.

D.

Create a copy of the dashboard.

Answers
Suggested answer: D

An engineer is troubleshooting connectivity to the DNS servers from hosts behind a new Cisco FTD device. The hosts cannot send DNS queries to servers in the DMZ. Which action should the engineer take to troubleshoot this issue using the real DNS packets?

A.

Use the Connection Events dashboard to check the block reason and adjust the inspection policy as needed.

A.

Use the Connection Events dashboard to check the block reason and adjust the inspection policy as needed.

Answers
B.

Use the packet capture tool to check where the traffic is being blocked and adjust the access control or intrusion policy as needed.

B.

Use the packet capture tool to check where the traffic is being blocked and adjust the access control or intrusion policy as needed.

Answers
C.

Use the packet tracer tool to determine at which hop the packet is being dropped.

C.

Use the packet tracer tool to determine at which hop the packet is being dropped.

Answers
D.

Use the show blocks command in the Threat Defense CLI tool and create a policy to allow the blocked traffic.

D.

Use the show blocks command in the Threat Defense CLI tool and create a policy to allow the blocked traffic.

Answers
Suggested answer: A

A security engineer is configuring an Access Control Policy for multiple branch locations. These locations share a common rule set and utilize a network object called INSIDE_NET which contains the locally significant internal network subnets at each location. Which technique will retain the policy consistency at each location but allow only the locally significant network subnet within the applicable rules?

A.

utilizing a dynamic Access Control Policy that updates from Cisco Talos

A.

utilizing a dynamic Access Control Policy that updates from Cisco Talos

Answers
B.

utilizing policy inheritance

B.

utilizing policy inheritance

Answers
C.

creating a unique Access Control Policy per device

C.

creating a unique Access Control Policy per device

Answers
D.

creating an Access Control Policy with an INSIDE_NET network object and object overrides

D.

creating an Access Control Policy with an INSIDE_NET network object and object overrides

Answers
Suggested answer: D

An engineer runs the command restore remote-manager-backup location 2.2.2.2 admin /Volume/home/admin FTD408566513.zip on a Cisco FMC. After connecting to the repository, the Cisco FTD device is unable to accept the backup file.

What is the reason for this failure?

A.

The backup file is not in .cfg format.

A.

The backup file is not in .cfg format.

Answers
B.

The wrong IP address is used.

B.

The wrong IP address is used.

Answers
C.

The backup file extension was changed from .tar to .zip.

C.

The backup file extension was changed from .tar to .zip.

Answers
D.

The directory location is incorrect.

D.

The directory location is incorrect.

Answers
Suggested answer: C

Explanation:

Reference: https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2019/pdf/BRKSEC-3455.pdf

A security engineer found a suspicious file from an employee email address and is trying to upload it for analysis, however the upload is failing. The last registration status is still active. What is the cause for this issue?

A.

Cisco AMP for Networks is unable to contact Cisco Threat Grid on premise.

A.

Cisco AMP for Networks is unable to contact Cisco Threat Grid on premise.

Answers
B.

Cisco AMP for Networks is unable to contact Cisco Threat Grid Cloud.

B.

Cisco AMP for Networks is unable to contact Cisco Threat Grid Cloud.

Answers
C.

There is a host limit set.

C.

There is a host limit set.

Answers
D.

The user agent status is set to monitor.

D.

The user agent status is set to monitor.

Answers
Suggested answer: B

An engineer must investigate a connectivity issue and decides to use the packet capture feature on Cisco FTD. The goal is to see the real packet going through the Cisco FTD device and see the Snort detection actions as a part of the output. After the capture-traffic command is issued, only the packets are displayed. Which action resolves this issue?

A.

Use the verbose option as a part of the capture-traffic command

A.

Use the verbose option as a part of the capture-traffic command

Answers
B.

Use the capture command and specify the trace option to get the required information.

B.

Use the capture command and specify the trace option to get the required information.

Answers
C.

Specify the trace using the -T option after the capture-traffic command.

C.

Specify the trace using the -T option after the capture-traffic command.

Answers
D.

Perform the trace within the Cisco FMC GUI instead of the Cisco FTD CLI.

D.

Perform the trace within the Cisco FMC GUI instead of the Cisco FTD CLI.

Answers
Suggested answer: B
Total 326 questions
Go to page: of 33