ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











What is the RTC workflow when the infected endpoint is identified?

A.

Cisco ISE instructs Cisco AMP to contain the infected endpoint.

A.

Cisco ISE instructs Cisco AMP to contain the infected endpoint.

Answers
B.

Cisco ISE instructs Cisco FMC to contain the infected endpoint.

B.

Cisco ISE instructs Cisco FMC to contain the infected endpoint.

Answers
C.

Cisco AMP instructs Cisco FMC to contain the infected endpoint.

C.

Cisco AMP instructs Cisco FMC to contain the infected endpoint.

Answers
D.

Cisco FMC instructs Cisco ISE to contain the infected endpoint.

D.

Cisco FMC instructs Cisco ISE to contain the infected endpoint.

Answers
Suggested answer: D

Which feature is supported by IRB on Cisco FTD devices?

A.

redundant interface

A.

redundant interface

Answers
B.

dynamic routing protocol

B.

dynamic routing protocol

Answers
C.

EtherChannel interface

C.

EtherChannel interface

Answers
D.

high-availability cluster

D.

high-availability cluster

Answers
Suggested answer: B

A security engineer is deploying a pair of primary and secondary Cisco FMC devices. The secondary must also receive updates from Cisco Talos. Which action achieves this goal?

A.

Force failover for the secondary Cisco FMC to synchronize the rule updates from the primary.

A.

Force failover for the secondary Cisco FMC to synchronize the rule updates from the primary.

Answers
B.

Configure the secondary Cisco FMC so that it receives updates from Cisco Talos.

B.

Configure the secondary Cisco FMC so that it receives updates from Cisco Talos.

Answers
C.

Manually import rule updates onto the secondary Cisco FMC device.

C.

Manually import rule updates onto the secondary Cisco FMC device.

Answers
D.

Configure the primary Cisco FMC so that the rules are updated.

D.

Configure the primary Cisco FMC so that the rules are updated.

Answers
Suggested answer: D

Refer to the exhibit.

A systems administrator conducts a connectivity test to their SCCM server from a host machine and gets no response from the server. Which action ensures that the ping packets reach the destination and that the host receives replies?

A.

Create an access control policy rule that allows ICMP traffic.

A.

Create an access control policy rule that allows ICMP traffic.

Answers
B.

Configure a custom Snort signature to allow ICMP traffic after Inspection.

B.

Configure a custom Snort signature to allow ICMP traffic after Inspection.

Answers
C.

Modify the Snort rules to allow ICMP traffic.

C.

Modify the Snort rules to allow ICMP traffic.

Answers
D.

Create an ICMP allow list and add the ICMP destination to remove it from the implicit deny list.

D.

Create an ICMP allow list and add the ICMP destination to remove it from the implicit deny list.

Answers
Suggested answer: A

A security engineer must configure a Cisco FTD appliance to inspect traffic coming from the internet.

The Internet traffic will be mirrored from the Cisco Catalyst 9300 Switch. Which configuration accomplishes the task?

A.

Set interface configuration mode to none.

A.

Set interface configuration mode to none.

Answers
B.

Set the firewall mode to transparent.

B.

Set the firewall mode to transparent.

Answers
C.

Set the firewall mode to routed.

C.

Set the firewall mode to routed.

Answers
D.

Set interface configuration mode to passive.

D.

Set interface configuration mode to passive.

Answers
Suggested answer: D

The network administrator wants to enhance the network security posture by enabling machine learning tor malware detection due to a concern with suspicious Microsoft executable file types that were seen while creating monthly security reports for the CIO. Which feature must be enabled to accomplish this goal?

A.

Spero

A.

Spero

Answers
B.

dynamic analysis

B.

dynamic analysis

Answers
C.

static analysis

C.

static analysis

Answers
D.

Ethos

D.

Ethos

Answers
Suggested answer: A

A network administrator is configuring a Cisco AMP public cloud instance and wants to capture infections and polymorphic variants of a threat to help detect families of malware. Which detection engine meets this requirement?

A.

RBAC

A.

RBAC

Answers
B.

Tetra

B.

Tetra

Answers
C.

Ethos

C.

Ethos

Answers
D.

Spero

D.

Spero

Answers
Suggested answer: C

A network engineer must provide redundancy between two Cisco FTD devices. The redundancy configuration must include automatic configuration, translation, and connection updates. After the initial configuration of the two appliances, which two steps must be taken to proceed with the redundancy configuration? (Choose two.)

A.

Configure the virtual MAC address on the failover link.

A.

Configure the virtual MAC address on the failover link.

Answers
B.

Disable hellos on the inside interface.

B.

Disable hellos on the inside interface.

Answers
C.

Configure the standby IP addresses.

C.

Configure the standby IP addresses.

Answers
D.

Ensure the high availability license is enabled.

D.

Ensure the high availability license is enabled.

Answers
E.

Configure the failover link with stateful properties.

E.

Configure the failover link with stateful properties.

Answers
Suggested answer: A, C

A network administrator is configuring an FTD in transparent mode. A bridge group is set up and an access policy has been set up to allow all IP traffic. Traffic is not passing through the FTD. What additional configuration is needed?

A.

The security levels of the interfaces must be set.

A.

The security levels of the interfaces must be set.

Answers
B.

A default route must be added to the FTD.

B.

A default route must be added to the FTD.

Answers
C.

An IP address must be assigned to the BVI.

C.

An IP address must be assigned to the BVI.

Answers
D.

A mac-access control list must be added to allow all MAC addresses.

D.

A mac-access control list must be added to allow all MAC addresses.

Answers
Suggested answer: C

A network administrator registered a new FTD to an existing FMC. The administrator cannot place the FTD in transparent mode. Which action enables transparent mode?

A.

Add a Bridge Group Interface to the FTD before transparent mode is configured.

A.

Add a Bridge Group Interface to the FTD before transparent mode is configured.

Answers
B.

Dereglster the FTD device from FMC and configure transparent mode via the CLI.

B.

Dereglster the FTD device from FMC and configure transparent mode via the CLI.

Answers
C.

Obtain an FTD model that supports transparent mode.

C.

Obtain an FTD model that supports transparent mode.

Answers
D.

Assign an IP address to two physical interfaces.

D.

Assign an IP address to two physical interfaces.

Answers
Suggested answer: B
Total 326 questions
Go to page: of 33