ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











An engineer defines a new rule while configuring an Access Control Policy. After deploying the policy, the rule is not working as expected and the hit counters associated with the rule are showing zero.

What is causing this error?

A.

Logging is not enabled for the rule.

A.

Logging is not enabled for the rule.

Answers
B.

The rule was not enabled after being created.

B.

The rule was not enabled after being created.

Answers
C.

The wrong source interface for Snort was selected in the rule.

C.

The wrong source interface for Snort was selected in the rule.

Answers
D.

An incorrect application signature was used in the rule.

D.

An incorrect application signature was used in the rule.

Answers
Suggested answer: B

A network administrator is configuring a site-to-site IPsec VPN to a router sitting behind a Cisco FTD.

The administrator has configured an access policy to allow traffic to this device on UDP 500, 4500, and ESP VPN traffic is not working. Which action resolves this issue?

A.

Set the allow action in the access policy to trust.

A.

Set the allow action in the access policy to trust.

Answers
B.

Enable IPsec inspection on the access policy.

B.

Enable IPsec inspection on the access policy.

Answers
C.

Modify the NAT policy to use the interface PAT.

C.

Modify the NAT policy to use the interface PAT.

Answers
D.

Change the access policy to allow all ports.

D.

Change the access policy to allow all ports.

Answers
Suggested answer: B

An engineer is configuring two new Cisco FTD devices to replace the existing high availability firewall pair in a highly secure environment. The information exchanged between the FTD devices over the failover link must be encrypted.

Which protocol supports this on the Cisco FTD?

A.

IPsec

A.

IPsec

Answers
B.

SSH

B.

SSH

Answers
C.

SSL

C.

SSL

Answers
D.

MACsec

D.

MACsec

Answers
Suggested answer: A

An engineer is troubleshooting HTTP traffic to a web server using the packet capture tool on CiscoFMC. When reviewing the captures, the engineer notices that there are a lot of packets that are notsourced from or destined to the web server being captured. How can the engineer reduce the strainof capturing packets for irrelevant traffic on the Cisco FTD device?

A.

Use the host filter in the packet capture to capture traffic to or from a specific host.

A.

Use the host filter in the packet capture to capture traffic to or from a specific host.

Answers
B.

Redirect the packet capture output to a .pcap file that can be opened with Wireshark.

B.

Redirect the packet capture output to a .pcap file that can be opened with Wireshark.

Answers
C.

Use the -c option to restrict the packet capture to only the first 100 packets.

C.

Use the -c option to restrict the packet capture to only the first 100 packets.

Answers
D.

Use an access-list within the packet capture to permit only HTTP traffic to and from the webserver.

D.

Use an access-list within the packet capture to permit only HTTP traffic to and from the webserver.

Answers
Suggested answer: A

A security engineer needs to configure a network discovery policy on a Cisco FMC appliance and prevent excessive network discovery events from overloading the FMC database? Which action must be taken to accomplish this task?

A.

Change the network discovery method to TCP/SYN.

A.

Change the network discovery method to TCP/SYN.

Answers
B.

Configure NetFlow exporters for monitored networks.

B.

Configure NetFlow exporters for monitored networks.

Answers
C.

Monitor only the default IPv4 and IPv6 network ranges.

C.

Monitor only the default IPv4 and IPv6 network ranges.

Answers
D.

Exclude load balancers and NAT devices in the policy.

D.

Exclude load balancers and NAT devices in the policy.

Answers
Suggested answer: D

An engineer is setting up a remote access VPN on a Cisco FTD device and wants to define which traffic gets sent over the VPN tunnel. Which named object type in Cisco FMC must be used to accomplish this task?

A.

split tunnel

A.

split tunnel

Answers
B.

crypto map

B.

crypto map

Answers
C.

access list

C.

access list

Answers
D.

route map

D.

route map

Answers
Suggested answer: A

Which process should be checked when troubleshooting registration issues between Cisco FMC and managed devices to verify that secure communication is occurring?

A.

fpcollect

A.

fpcollect

Answers
B.

dhclient

B.

dhclient

Answers
C.

sfmgr

C.

sfmgr

Answers
D.

sftunnel

D.

sftunnel

Answers
Suggested answer: D

An engineer needs to configure remote storage on Cisco FMC. Configuration backups must be available from a secure location on the network for disaster recovery. Reports need to back up to a shared location that auditors can access with their Active Directory logins. Which strategy must the engineer use to meet these objectives?

A.

Use SMB for backups and NFS for reports.

A.

Use SMB for backups and NFS for reports.

Answers
B.

Use NFS for both backups and reports.

B.

Use NFS for both backups and reports.

Answers
C.

Use SMB for both backups and reports.

C.

Use SMB for both backups and reports.

Answers
D.

Use SSH for backups and NFS for reports.

D.

Use SSH for backups and NFS for reports.

Answers
Suggested answer: C

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/system_configuration.html#ID-2241-00000551“You cannot send backups to one remote system and reports to another, but you can choose to sendeither to a remote system and store the other on the Firepower Management Center.”

A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address https://<FMCIP>/capture/CAPI/pcap/test.pcap. an error 403: Forbidden is given instead of the PCAP file. Which action must the engineer take to resolve this issue?

A.

Cisco Firepower Threat Defense mode

A.

Cisco Firepower Threat Defense mode

Answers
B.

routed mode

B.

routed mode

Answers
C.

Integrated routing and bridging

C.

Integrated routing and bridging

Answers
D.

transparent mode

D.

transparent mode

Answers
Suggested answer: D

Explanation:

Transparent mode is a firewall configuration in which the firewall acts as a ''bump in the wire'' or a''stealth firewall'' and is not seen as a router hop to connected devices. In transparent mode, the firewallcan forward traffic at both layer 2 and layer 3 for the same subnet, as it does not perform any addresstranslation or routing. The firewall inspects the traffic and applies security policies based on the sourceand destination IP addresses, ports, and protocols.Transparent mode is useful when you want to deploya firewall without changing the existing network topology or addressing scheme1.

A security engineer must configure policies tor a recently deployed Cisco FTD. The security policy for the company dictates that when five or more connections from external sources are initiated within 2 minutes, there is cause for concern. Which type of policy must be configured in Cisco FMC \z generate an alert when this condition is triggered?

A.

application detector

A.

application detector

Answers
B.

access control

B.

access control

Answers
C.

intrusion

C.

intrusion

Answers
D.

correlation

D.

correlation

Answers
Suggested answer: D

Explanation:

A correlation policy is a feature that allows you to respond in real time to threats or specific conditions on your network, using correlation rules.A correlation rule can trigger when the system generates a specific type of event, or when your network traffic deviates from its normal profile1.When a correlation rule triggers, the system generates a correlation event and can also launch a response, such as sending an alert, blocking an IP address, or scanning a host1.

In this case, the security engineer can configure a correlation rule that triggers when the system detects five or more connections from external sources within 2 minutes. The engineer can also configure a response that sends an alert to the FMC or an email recipient when this condition is triggered.The engineer can then create a correlation policy that includes this rule and activate it on the FTD device1.

The other options are incorrect because:

An application detector is a feature that allows you to detect web applications, clients, and application protocols based on patterns in network traffic.An application detector does not generate alerts based on the number of connections from external sources2.

An access control policy is a feature that allows you to control traffic flow through your network and inspect traffic for intrusions, malware, and files.An access control policy does not generate alerts based on the number of connections from external sources3.

An intrusion policy is a feature that allows you to detect and prevent malicious network activity using Snort rules.An intrusion policy does not generate alerts based on the number of connections from external sources4.

Total 326 questions
Go to page: of 33