ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











The administrator notices that there is malware present with an .exe extension and needs to verify if any of the systems on the network are running the executable file. What must be configured within Cisco AMP for Endpoints to show this data?

A.

prevalence

A.

prevalence

Answers
B.

threat root cause

B.

threat root cause

Answers
C.

vulnerable software

C.

vulnerable software

Answers
D.

file analysis

D.

file analysis

Answers
Suggested answer: A

An organization must be able to ingest NetFlow traffic from their Cisco FTD device to Cisco Stealthwatch for behavioral analysis. What must be configured on the Cisco FTD to meet this requirement?

A.

interface object to export NetFlow

A.

interface object to export NetFlow

Answers
B.

security intelligence object for NetFlow

B.

security intelligence object for NetFlow

Answers
C.

flexconfig object for NetFlow

C.

flexconfig object for NetFlow

Answers
D.

variable set object for NetFlow

D.

variable set object for NetFlow

Answers
Suggested answer: C

An administrator must use Cisco FMC to install a backup route within the Cisco FTD to route traffic in case of a routing failure with the primary route. Which action accomplishes this task?

A.

Install the static backup route and modify the metric to be less than the primary route.

A.

Install the static backup route and modify the metric to be less than the primary route.

Answers
B.

Configure EIGRP routing on the FMC to ensure that dynamic routes are always updated.

B.

Configure EIGRP routing on the FMC to ensure that dynamic routes are always updated.

Answers
C.

Use a default route on the FMC instead of having multiple routes contending for priority.

C.

Use a default route on the FMC instead of having multiple routes contending for priority.

Answers
D.

Create the backup route and use route tracking on both routes to a destination IP address in the network.

D.

Create the backup route and use route tracking on both routes to a destination IP address in the network.

Answers
Suggested answer: A

A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address https://<FMC

IP>/capture/CAPI/pcap/test.pcap. an error 403: Forbidden is given instead of the PCAP file. Which action must the engineer take to resolve this issue?

A.

Disable the HTTPS server and use HTTP instead.

A.

Disable the HTTPS server and use HTTP instead.

Answers
B.

Enable the HTTPS server for the device platform policy.

B.

Enable the HTTPS server for the device platform policy.

Answers
C.

Disable the proxy setting on the browser.

C.

Disable the proxy setting on the browser.

Answers
D.

Use the Cisco FTD IP address as the proxy server setting on the browser.

D.

Use the Cisco FTD IP address as the proxy server setting on the browser.

Answers
Suggested answer: B

Explanation:

When you configure the Cisco Firepower devices to bypass the access control policies for VPN traffic, thedevices will not inspect the VPN traffic and thus will not waste resources on it. This is the best option toensure that the VPN traffic is not wasting resources on the Cisco Firepower devices.

An engineer integrates Cisco FMC and Cisco ISE using pxGrid. Which role is assigned for Cisco FMC?

A.

controller

A.

controller

Answers
B.

publisher

B.

publisher

Answers
C.

client

C.

client

Answers
D.

server

D.

server

Answers
Suggested answer: C

An engineer is configuring Cisco FMC and wants to limit the time allowed for processing packets through the interface However if the time is exceeded the configuration must allow packets to bypass detection What must be configured on the Cisco FMC to accomplish this task?

A.

Fast-Path Rules Bypass

A.

Fast-Path Rules Bypass

Answers
B.

Cisco ISE Security Group Tag

B.

Cisco ISE Security Group Tag

Answers
C.

Inspect Local Traffic Bypass

C.

Inspect Local Traffic Bypass

Answers
D.

Automatic Application Bypass

D.

Automatic Application Bypass

Answers
Suggested answer: D

An engineer is »vorlang on a LAN switch and has noticed that its network connection to the mime Cisco IPS has gone down Upon troubleshooting it is determined that the switch is working as expected What must have been implemented for this failure to occur?

A.

The upstream router has a misconfigured routing protocol

A.

The upstream router has a misconfigured routing protocol

Answers
B.

Link-state propagation is enabled

B.

Link-state propagation is enabled

Answers
C.

The Cisco IPS has been configured to be in fail-open mode

C.

The Cisco IPS has been configured to be in fail-open mode

Answers
D.

The Cisco IPS is configured in detection mode

D.

The Cisco IPS is configured in detection mode

Answers
Suggested answer: D

Refer to the exhibit An engineer is modifying an access control pokey to add a rule to inspect all DNS traffic that passes through the firewall After making the change and deploying the pokey they see that DNS traffic is not bang inspected by the Snort engine What is the problem?

A.

The rule must specify the security zone that originates the traffic

A.

The rule must specify the security zone that originates the traffic

Answers
B.

The rule must define the source network for inspection as well as the port

B.

The rule must define the source network for inspection as well as the port

Answers
C.

The action of the rule is set to trust instead of allow.

C.

The action of the rule is set to trust instead of allow.

Answers
D.

The rule is configured with the wrong setting for the source port

D.

The rule is configured with the wrong setting for the source port

Answers
Suggested answer: C

What is the role of the casebook feature in Cisco Threat Response?

A.

sharing threat analysts

A.

sharing threat analysts

Answers
B.

pulling data via the browser extension

B.

pulling data via the browser extension

Answers
C.

triage automaton with alerting

C.

triage automaton with alerting

Answers
D.

alert prioritization

D.

alert prioritization

Answers
Suggested answer: A

Explanation:

The casebook and pivot menu are widgets available in Cisco Threat Response. Casebook - It is used to record, organize, and share sets of observables of interest primarily during an investigation and threat analysis. You can use a casebook to get the current verdicts or dispositions on the observables.

https://www.cisco.com/c/en/us/td/docs/security/ces/user_guide/esa_user_guide_13-5-1/b_ESA_Admin_Guide_ces_13-5-1/b_ESA_Admin_Guide_13-0_chapter_0110001.pdf

A network engineer sets up a secondary Cisco FMC that is integrated with Cisco Security Packet Analyzer What occurs when the secondary Cisco FMC synchronizes with the primary Cisco FMC?

A.

The existing integration configuration is replicated to the primary Cisco FMC

A.

The existing integration configuration is replicated to the primary Cisco FMC

Answers
B.

The existing configuration for integration of the secondary Cisco FMC the Cisco Security Packet Analyzer is overwritten.

B.

The existing configuration for integration of the secondary Cisco FMC the Cisco Security Packet Analyzer is overwritten.

Answers
C.

The synchronization between the primary and secondary Cisco FMC fails

C.

The synchronization between the primary and secondary Cisco FMC fails

Answers
D.

The secondary Cisco FMC must be reintegrated with the Cisco Security Packet Analyzer after the synchronization

D.

The secondary Cisco FMC must be reintegrated with the Cisco Security Packet Analyzer after the synchronization

Answers
Suggested answer: B
Total 326 questions
Go to page: of 33