ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











Which Cisco FMC report gives the analyst information about the ports and protocols that are related to the configured sensitive network for analysis?

A.

Malware Report

A.

Malware Report

Answers
B.

Host Report

B.

Host Report

Answers
C.

Firepower Report

C.

Firepower Report

Answers
D.

Network Report

D.

Network Report

Answers
Suggested answer: D

An engineer is investigating connectivity problems on Cisco Firepower for a specific SGT. Which command allows the engineer to capture real packets that pass through the firewall using an SGT of 64?

A.

capture CAP type inline-tag 64 match ip any any

A.

capture CAP type inline-tag 64 match ip any any

Answers
B.

capture CAP match 64 type inline-tag ip any any

B.

capture CAP match 64 type inline-tag ip any any

Answers
C.

capture CAP headers-only type inline-tag 64 match ip any any

C.

capture CAP headers-only type inline-tag 64 match ip any any

Answers
D.

capture CAP buffer 64 match ip any any

D.

capture CAP buffer 64 match ip any any

Answers
Suggested answer: A

A company is in the process of deploying intrusion protection with Cisco FTDs managed by a Cisco FMC. Which action must be selected to enable fewer rules detect only critical conditions and avoid false positives?

A.

Connectivity Over Security

A.

Connectivity Over Security

Answers
B.

Balanced Security and Connectivity

B.

Balanced Security and Connectivity

Answers
C.

Maximum Detection

C.

Maximum Detection

Answers
D.

No Rules Active

D.

No Rules Active

Answers
Suggested answer: A

An engineer wants to add an additional Cisco FTD Version 6.2.3 device to their current 6.2.3 deployment to create a high availability pair.

The currently deployed Cisco FTD device is using local management and identical hardware including the available port density to enable the failover and stateful links required in a proper high availability deployment. Which action ensures that the environment is ready to pair the new Cisco FTD with the old one?

A.

Change from Cisco FDM management to Cisco FMC management on both devices and register them to FMC.

A.

Change from Cisco FDM management to Cisco FMC management on both devices and register them to FMC.

Answers
B.

Ensure that the two devices are assigned IP addresses from the 169 254.0.0/16 range for failover interfaces.

B.

Ensure that the two devices are assigned IP addresses from the 169 254.0.0/16 range for failover interfaces.

Answers
C.

Factory reset the current Cisco FTD so that it can synchronize configurations with the new Cisco FTD device.

C.

Factory reset the current Cisco FTD so that it can synchronize configurations with the new Cisco FTD device.

Answers
D.

Ensure that the configured DNS servers match on the two devices for name resolution.

D.

Ensure that the configured DNS servers match on the two devices for name resolution.

Answers
Suggested answer: A

Refer to the exhibit.

What is the effect of the existing Cisco FMC configuration?

A.

The remote management port for communication between the Cisco FMC and the managed device changes to port 8443.

A.

The remote management port for communication between the Cisco FMC and the managed device changes to port 8443.

Answers
B.

The managed device is deleted from the Cisco FMC.

B.

The managed device is deleted from the Cisco FMC.

Answers
C.

The SSL-encrypted communication channel between the Cisco FMC and the managed device becomes plain-text communication channel.

C.

The SSL-encrypted communication channel between the Cisco FMC and the managed device becomes plain-text communication channel.

Answers
D.

The management connection between the Cisco FMC and the Cisco FTD is disabled.

D.

The management connection between the Cisco FMC and the Cisco FTD is disabled.

Answers
Suggested answer: D

An engineer is troubleshooting a file that is being blocked by a Cisco FTD device on the network.

The user is reporting that the file is not malicious.

Which action does the engineer take to identify the file and validate whether or not it is malicious?

A.

identify the file in the intrusion events and submit it to Threat Grid for analysis.

A.

identify the file in the intrusion events and submit it to Threat Grid for analysis.

Answers
B.

Use FMC file analysis to look for the file and select Analyze to determine its disposition.

B.

Use FMC file analysis to look for the file and select Analyze to determine its disposition.

Answers
C.

Use the context explorer to find the file and download it to the local machine for investigation.

C.

Use the context explorer to find the file and download it to the local machine for investigation.

Answers
D.

Right click the connection event and send the file to AMP for Endpoints to see if the hash is malicious.

D.

Right click the connection event and send the file to AMP for Endpoints to see if the hash is malicious.

Answers
Suggested answer: A

Which protocol is needed to exchange threat details in rapid threat containment on Cisco FMC?

A.

SGT

A.

SGT

Answers
B.

SNMP v3

B.

SNMP v3

Answers
C.

BFD

C.

BFD

Answers
D.

pxGrid

D.

pxGrid

Answers
Suggested answer: D

An administrator Is setting up a Cisco PMC and must provide expert mode access for a security engineer. The engineer Is permitted to use only a secured out-of-band network workstation with a static IP address to access the Cisco FMC.

What must be configured to enable this access?

A.

Enable SSH and define an access list.

A.

Enable SSH and define an access list.

Answers
B.

Enable HTTP and define an access list.

B.

Enable HTTP and define an access list.

Answers
C.

Enable SCP under the Access List section.

C.

Enable SCP under the Access List section.

Answers
D.

Enable HTTPS and SNMP under the Access List section.

D.

Enable HTTPS and SNMP under the Access List section.

Answers
Suggested answer: A

An engainer must add DNS-specific rules to me Cisco FTD intrusion policy. The engineer wants to use the rules currently in the Cisco FTD Snort database that are not already enabled but does not want to enable more than are needed.

Which action meets these requirements?

A.

Change the dynamic state of the rule within the policy.

A.

Change the dynamic state of the rule within the policy.

Answers
B.

Change the base policy to Security over Connectivity.

B.

Change the base policy to Security over Connectivity.

Answers
C.

Change the rule state within the policy being used.

C.

Change the rule state within the policy being used.

Answers
D.

Change the rules using the Generate and Use Recommendations feature.

D.

Change the rules using the Generate and Use Recommendations feature.

Answers
Suggested answer: C

A network administrator is trying to convert from LDAP to LDAPS for VPN user authentication on a Cisco FTD. Which action must be taken on the Cisco FTD objects to accomplish this task?

A.

Add a Key Chain object to acquire the LDAPS certificate.

A.

Add a Key Chain object to acquire the LDAPS certificate.

Answers
B.

Create a Certificate Enrollment object to get the LDAPS certificate needed.

B.

Create a Certificate Enrollment object to get the LDAPS certificate needed.

Answers
C.

Identify the LDAPS cipher suite and use a Cipher Suite List object to define the Cisco FTD connection requirements.

C.

Identify the LDAPS cipher suite and use a Cipher Suite List object to define the Cisco FTD connection requirements.

Answers
D.

Modify the Policy List object to define the session requirements for LDAPS.

D.

Modify the Policy List object to define the session requirements for LDAPS.

Answers
Suggested answer: B
Total 326 questions
Go to page: of 33