Cisco 300-710 Practice Test - Questions Answers, Page 22
List of questions
Related questions
What is the RTC workflow when the infected endpoint is identified?
Cisco ISE instructs Cisco AMP to contain the infected endpoint.
Cisco ISE instructs Cisco FMC to contain the infected endpoint.
Cisco AMP instructs Cisco FMC to contain the infected endpoint.
Cisco FMC instructs Cisco ISE to contain the infected endpoint.
Which feature is supported by IRB on Cisco FTD devices?
redundant interface
dynamic routing protocol
EtherChannel interface
high-availability cluster
A security engineer is deploying a pair of primary and secondary Cisco FMC devices. The secondary must also receive updates from Cisco Talos. Which action achieves this goal?
Force failover for the secondary Cisco FMC to synchronize the rule updates from the primary.
Configure the secondary Cisco FMC so that it receives updates from Cisco Talos.
Manually import rule updates onto the secondary Cisco FMC device.
Configure the primary Cisco FMC so that the rules are updated.
Refer to the exhibit.
A systems administrator conducts a connectivity test to their SCCM server from a host machine and gets no response from the server. Which action ensures that the ping packets reach the destination and that the host receives replies?
Create an access control policy rule that allows ICMP traffic.
Configure a custom Snort signature to allow ICMP traffic after Inspection.
Modify the Snort rules to allow ICMP traffic.
Create an ICMP allow list and add the ICMP destination to remove it from the implicit deny list.
A security engineer must configure a Cisco FTD appliance to inspect traffic coming from the internet.
The Internet traffic will be mirrored from the Cisco Catalyst 9300 Switch. Which configuration accomplishes the task?
Set interface configuration mode to none.
Set the firewall mode to transparent.
Set the firewall mode to routed.
Set interface configuration mode to passive.
The network administrator wants to enhance the network security posture by enabling machine learning tor malware detection due to a concern with suspicious Microsoft executable file types that were seen while creating monthly security reports for the CIO. Which feature must be enabled to accomplish this goal?
Spero
dynamic analysis
static analysis
Ethos
A network administrator is configuring a Cisco AMP public cloud instance and wants to capture infections and polymorphic variants of a threat to help detect families of malware. Which detection engine meets this requirement?
RBAC
Tetra
Ethos
Spero
A network engineer must provide redundancy between two Cisco FTD devices. The redundancy configuration must include automatic configuration, translation, and connection updates. After the initial configuration of the two appliances, which two steps must be taken to proceed with the redundancy configuration? (Choose two.)
Configure the virtual MAC address on the failover link.
Disable hellos on the inside interface.
Configure the standby IP addresses.
Ensure the high availability license is enabled.
Configure the failover link with stateful properties.
A network administrator is configuring an FTD in transparent mode. A bridge group is set up and an access policy has been set up to allow all IP traffic. Traffic is not passing through the FTD. What additional configuration is needed?
The security levels of the interfaces must be set.
A default route must be added to the FTD.
An IP address must be assigned to the BVI.
A mac-access control list must be added to allow all MAC addresses.
A network administrator registered a new FTD to an existing FMC. The administrator cannot place the FTD in transparent mode. Which action enables transparent mode?
Add a Bridge Group Interface to the FTD before transparent mode is configured.
Dereglster the FTD device from FMC and configure transparent mode via the CLI.
Obtain an FTD model that supports transparent mode.
Assign an IP address to two physical interfaces.
Question