Cisco 300-710 Practice Test - Questions Answers, Page 27
List of questions
Related questions
Which default action setting in a Cisco FTD Access Control Policy allows all traffic from an undefined application to pass without Snort Inspection?
Trust All Traffic
Inherit from Base Policy
Network Discovery Only
Intrusion Prevention
A network administrator must create an EtherChannel Interface on a new Cisco Firepower 9300 appliance registered with an FMC tor high availability. Where must the administrator create the EtherChannel interface?
FMC CLI
FTD CLI
FXOS CLI
FMC GUI
An engineer Is configuring a Cisco FTD device to place on the Finance VLAN to provide additional protection tor company financial dat
a. The device must be deployed without requiring any changes on the end user workstations, which currently use DHCP lo obtain an IP address. How must the engineer deploy the device to meet this requirement?
Deploy the device in routed mode and allow DHCP traffic in the access control policies.
Deploy the device in routed made aid enable the DHCP Relay feature.
Deploy the device in transparent mode and allow DHCP traffic in the access control policies
Deploy the device in transparent mode and enable the DHCP Server feature.
A consultant Is working on a project where the customer is upgrading from a single Cisco Firepower 2130 managed by FDM to a pair of Cisco Firepower 2130s managed oy FMC tor nigh availability. The customer wants the configures of the existing device being managed by FDM to be carried over to FMC and then replicated to the additional: device being added to create the high availability pair. Which action must the consultant take to meet this requirement?
The current FDM configuration must be configured by hand into FMC before the devices are registered.
The current FDM configuration will be converted automatically into FMC when the device registers.
The current FDM configuration must be migrated to FMC using the Secure Firewall Migration Tool.
The FTD configuration must be converted to ASA command format, which can then be migrated to FMC.
An engineer plans to reconfigure an existing Cisco FTD from transparent mode to routed mode. Which additional action must be taken to maintain communication Between me two network segments?
Configure a NAT rule so mat traffic between the segments is exempt from NAT.
Update the IP addressing so that each segment is a unique IP subnet.
Deploy inbound ACLs on each interface to allow traffic between the segments.
Assign a unique VLAN ID for the interface in each segment.
A network administrator reviews me attack risk report and notices several Low-Impact attacks. What does this type of attack indicate?
All attacks are listed as low until manually categorized.
The host is not vulnerable to those attacks.
The attacks are not dangerous to the network.
The host is not within the administrator's environment.
When an engineer captures traffic on a Cisco FTD to troubleshoot a connectivity problem, they receive a large amount of output data in the GUI tool. The engineer found that viewing the Captures this way is time-consuming and difficult lo son and filter. Which file type must the engineer export the data in so that it can be reviewed using a tool built for this type of analysis?
NetFlow v9
PCAP
NetFlow v5
IPFIX
Network users are experiencing Intermittent issues with internet access. An engineer ident med mat the issue Is being caused by NAT exhaustion. How must the engineer change the dynamic NAT configuration to provide internet access for more users without running out of resources?
Define an additional static NAT for the network object in use.
Configure fallthrough to interface PAT on 'he Advanced tab.
Convert the dynamic auto NAT rule to dynamic manual NAT.
Add an identity NAT rule to handle the overflow of users.
An engineer is configuring a custom intrusion rule on Cisco FMC. The engineer needs the rule to search the payload or stream for the string '|45 5* 26 27 4 0A|*. Which Keyword must the engineer use with this stung lo create an argument for packed inspection?
metadata
Content
Protected _ content
data
A network administrator is reviewing a weekly scheduled attacks risk report and notices a host that is flagged for an impact 2 attack. Where should the administrator look within Cisco FMC to find out more relevant information about this host and attack?
Analysis > Lookup > Whols
Analysis > Correlation > Correlation Events
Analysis > Hosts > Vulnerabilities
Analysis > Hosts > Host Attributes
Question