ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











A security engineer must deploy a Cisco FTD appliance as a bump in the wire to detect intrusion events without disrupting the flow of network traffic. Which two features must be configured to accomplish the task? (Choose two.)

A.

inline set pair

A.

inline set pair

Answers
B.

transparent mode

B.

transparent mode

Answers
C.

tapemode

C.

tapemode

Answers
D.

passive interfaces

D.

passive interfaces

Answers
E.

bridged mode

E.

bridged mode

Answers
Suggested answer: B, C

Due to an Increase in malicious events, a security engineer must generate a threat report to include intrusion events, malware events, and security intelligence events. How Is this information collected in a single report?

A.

Run the default Firepower report.

A.

Run the default Firepower report.

Answers
B.

Export the Attacks Risk report.

B.

Export the Attacks Risk report.

Answers
C.

Generate a malware report.

C.

Generate a malware report.

Answers
D.

Create a Custom report.

D.

Create a Custom report.

Answers
Suggested answer: D

An engineer attempts to pull the configuration for a Cisco FTD sensor to review with Cisco TAC but does not have direct access to the CU for the device. The CLl for the device is managed by Cisco FMC to which the engineer has access.

Which action in Cisco FMC grants access to the CLl for the device?

A.

Export the configuration using the Import/Export tool within Cisco FMC.

A.

Export the configuration using the Import/Export tool within Cisco FMC.

Answers
B.

Create a backup of the configuration within the Cisco FMC.

B.

Create a backup of the configuration within the Cisco FMC.

Answers
C.

Use the show run all command in the Cisco FTD CLI feature within Cisco FMC.

C.

Use the show run all command in the Cisco FTD CLI feature within Cisco FMC.

Answers
D.

Download the configuration file within the File Download section of Cisco FMC.

D.

Download the configuration file within the File Download section of Cisco FMC.

Answers
Suggested answer: A

An administrator is attempting to add a new FTD device to their FMC behind a NAT device with a NAT ID of NAT001 and a password of Cisco0420l06525. The private IP address of the FMC server is 192.168.45.45. which is being translated to the public IP address of 209.165.200.225/27. Which command set must be used in order to accomplish this task?

A.

configure manager add 209.165.200.225 <reg_key> <nat_id>

A.

configure manager add 209.165.200.225 <reg_key> <nat_id>

Answers
B.

configure manager add 192.168.45,45 <reg_key> <nat_id>

B.

configure manager add 192.168.45,45 <reg_key> <nat_id>

Answers
C.

configure manager add 209.165.200.225 255.255.255.224 <reg_key> <nat_id>

C.

configure manager add 209.165.200.225 255.255.255.224 <reg_key> <nat_id>

Answers
D.

configure manager add 209.165.200.225/27 <reg_key> <nat_id>

D.

configure manager add 209.165.200.225/27 <reg_key> <nat_id>

Answers
Suggested answer: A

A security analyst must create a new report within Cisco FMC to show an overview of the daily attacks, vulnerabilities, and connections. The analyst wants to reuse specific dashboards from other reports to create this consolidated one.

Which action accomplishes this task?

A.

Create a new dashboard object via Object Management to represent the desired views.

A.

Create a new dashboard object via Object Management to represent the desired views.

Answers
B.

Modify the Custom Workflows within the Cisco FMC to feed the desired data into the new report.

B.

Modify the Custom Workflows within the Cisco FMC to feed the desired data into the new report.

Answers
C.

Copy the Malware Report and modify the sections to pull components from other reports.

C.

Copy the Malware Report and modify the sections to pull components from other reports.

Answers
D.

Use the import feature in the newly created report to select which dashboards to add.

D.

Use the import feature in the newly created report to select which dashboards to add.

Answers
Suggested answer: D

A network administrator has converted a Cisco FTD from using LDAP to LDAPS for VPN authentication. The Cisco FMC can connect to the LDAPS server, but the Cisco FTD is not connecting.

Which configuration must be enabled on the Cisco FTD?

A.

SSL must be set to a use TLSv1.2 or lower.

A.

SSL must be set to a use TLSv1.2 or lower.

Answers
B.

The LDAPS must be allowed through the access control policy.

B.

The LDAPS must be allowed through the access control policy.

Answers
C.

DNS servers must be defined for name resolution.

C.

DNS servers must be defined for name resolution.

Answers
D.

The RADIUS server must be defined.

D.

The RADIUS server must be defined.

Answers
Suggested answer: B

When using Cisco Threat Response, which phase of the Intelligence Cycle publishes the results of the investigation?

A.

direction

A.

direction

Answers
B.

dissemination

B.

dissemination

Answers
C.

processing

C.

processing

Answers
D.

analysis

D.

analysis

Answers
Suggested answer: B

Explanation:

Disseminate: The dissemination phase publishes the results of the investigation or threat hunt. This information is disseminated with a focus on the receivers of the information. At the tactical level, this information feeds back into the beginning of the F3EAD model, Find. Figure 3 illustrates the F3EAD model.

A security engineer must integrate an external feed containing STIX/TAXII data with Cisco FMC.

Which feature must be enabled on the Cisco FMC to support this connection?

A.

Cisco Success Network

A.

Cisco Success Network

Answers
B.

Cisco Secure Endpoint Integration

B.

Cisco Secure Endpoint Integration

Answers
C.

Threat Intelligence Director

C.

Threat Intelligence Director

Answers
D.

Security Intelligence Feeds

D.

Security Intelligence Feeds

Answers
Suggested answer: C

A network administrator wants to block traffic to a known malware site at https://www.badsite.comand all subdomains while ensuring no packets from any internal client are sent to that site. Whichtype of policy must the network administrator use to accomplish this goal?

A.

Prefilter policy

A.

Prefilter policy

Answers
B.

SSL policy

B.

SSL policy

Answers
C.

DNS policy

C.

DNS policy

Answers
D.

Access Control policy with URL filtering

D.

Access Control policy with URL filtering

Answers
Suggested answer: D

An organization is configuring a new Cisco Firepower High Availability deployment. Which action must be taken to ensure that failover is as seamless as possible to end users?

A.

Set up a virtual failover MAC address between chassis.

A.

Set up a virtual failover MAC address between chassis.

Answers
B.

Use a dedicated stateful link between chassis.

B.

Use a dedicated stateful link between chassis.

Answers
C.

Load the same software version on both chassis.

C.

Load the same software version on both chassis.

Answers
D.

Set the same FQDN for both chassis.

D.

Set the same FQDN for both chassis.

Answers
Suggested answer: B
Total 326 questions
Go to page: of 33