Cisco 300-710 Practice Test - Questions Answers, Page 26
List of questions
Related questions
An engineer defines a new rule while configuring an Access Control Policy. After deploying the policy, the rule is not working as expected and the hit counters associated with the rule are showing zero.
What is causing this error?
Logging is not enabled for the rule.
The rule was not enabled after being created.
The wrong source interface for Snort was selected in the rule.
An incorrect application signature was used in the rule.
A network administrator is configuring a site-to-site IPsec VPN to a router sitting behind a Cisco FTD.
The administrator has configured an access policy to allow traffic to this device on UDP 500, 4500, and ESP VPN traffic is not working. Which action resolves this issue?
Set the allow action in the access policy to trust.
Enable IPsec inspection on the access policy.
Modify the NAT policy to use the interface PAT.
Change the access policy to allow all ports.
An engineer is configuring two new Cisco FTD devices to replace the existing high availability firewall pair in a highly secure environment. The information exchanged between the FTD devices over the failover link must be encrypted.
Which protocol supports this on the Cisco FTD?
IPsec
SSH
SSL
MACsec
An engineer is troubleshooting HTTP traffic to a web server using the packet capture tool on CiscoFMC. When reviewing the captures, the engineer notices that there are a lot of packets that are notsourced from or destined to the web server being captured. How can the engineer reduce the strainof capturing packets for irrelevant traffic on the Cisco FTD device?
Use the host filter in the packet capture to capture traffic to or from a specific host.
Redirect the packet capture output to a .pcap file that can be opened with Wireshark.
Use the -c option to restrict the packet capture to only the first 100 packets.
Use an access-list within the packet capture to permit only HTTP traffic to and from the webserver.
A security engineer needs to configure a network discovery policy on a Cisco FMC appliance and prevent excessive network discovery events from overloading the FMC database? Which action must be taken to accomplish this task?
Change the network discovery method to TCP/SYN.
Configure NetFlow exporters for monitored networks.
Monitor only the default IPv4 and IPv6 network ranges.
Exclude load balancers and NAT devices in the policy.
An engineer is setting up a remote access VPN on a Cisco FTD device and wants to define which traffic gets sent over the VPN tunnel. Which named object type in Cisco FMC must be used to accomplish this task?
split tunnel
crypto map
access list
route map
Which process should be checked when troubleshooting registration issues between Cisco FMC and managed devices to verify that secure communication is occurring?
fpcollect
dhclient
sfmgr
sftunnel
An engineer needs to configure remote storage on Cisco FMC. Configuration backups must be available from a secure location on the network for disaster recovery. Reports need to back up to a shared location that auditors can access with their Active Directory logins. Which strategy must the engineer use to meet these objectives?
Use SMB for backups and NFS for reports.
Use NFS for both backups and reports.
Use SMB for both backups and reports.
Use SSH for backups and NFS for reports.
A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address https://<FMCIP>/capture/CAPI/pcap/test.pcap. an error 403: Forbidden is given instead of the PCAP file. Which action must the engineer take to resolve this issue?
Cisco Firepower Threat Defense mode
routed mode
Integrated routing and bridging
transparent mode
A security engineer must configure policies tor a recently deployed Cisco FTD. The security policy for the company dictates that when five or more connections from external sources are initiated within 2 minutes, there is cause for concern. Which type of policy must be configured in Cisco FMC \z generate an alert when this condition is triggered?
application detector
access control
intrusion
correlation
Question