ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











Which default action setting in a Cisco FTD Access Control Policy allows all traffic from an undefined application to pass without Snort Inspection?

A.

Trust All Traffic

A.

Trust All Traffic

Answers
B.

Inherit from Base Policy

B.

Inherit from Base Policy

Answers
C.

Network Discovery Only

C.

Network Discovery Only

Answers
D.

Intrusion Prevention

D.

Intrusion Prevention

Answers
Suggested answer: A

Explanation:

The default action setting in a Cisco FTD Access Control Policy determines how the system handles and logs traffic that is not handled by any other access control configuration.The default action can block or trust all traffic without further inspection, or inspect traffic for intrusions and discovery data3.

The Trust All Traffic option allows all traffic from an undefined application to pass without Snort inspection. This option also disables Security Intelligence filtering, file and malware inspection, and URL filtering for all traffic handled by the default action.This option is useful when you want to minimize the performance impact of access control on your network3.

The other options are incorrect because:

The Inherit from Base Policy option inherits the default action setting from the base policy. The base policy is the predefined access control policy that you use as a starting point for creating your own policies.Depending on which base policy you choose, the inherited default action setting can be different3.

The Network Discovery Only option inspects all traffic for discovery data only. This option enables Security Intelligence filtering for all traffic handled by the default action, but disables file and malware inspection, URL filtering, and intrusion inspection.This option is useful when you want to collect information about your network before you configure access control rules3.

The Intrusion Prevention option inspects all traffic for intrusions and discovery data. This option enables Security Intelligence filtering, file and malware inspection, URL filtering, and intrusion inspection for all traffic handled by the default action.This option provides the most comprehensive protection for your network, but also has the most performance impact3.

A network administrator must create an EtherChannel Interface on a new Cisco Firepower 9300 appliance registered with an FMC tor high availability. Where must the administrator create the EtherChannel interface?

A.

FMC CLI

A.

FMC CLI

Answers
B.

FTD CLI

B.

FTD CLI

Answers
C.

FXOS CLI

C.

FXOS CLI

Answers
D.

FMC GUI

D.

FMC GUI

Answers
Suggested answer: C

Explanation:

An EtherChannel interface is a logical interface that consists of a bundle of individual Ethernet links that act as a single network link.An EtherChannel interface can increase the bandwidth and reliability of a network connection5.

On a Cisco Firepower 9300 appliance registered with an FMC for high availability, the network administrator must create the EtherChannel interface on the FXOS CLI.The FXOS is the operating system that runs on the Firepower 9300 chassis and provides hardware management functions such as interface configuration, power supply status, fan speed control, and so on6.

To create an EtherChannel interface on the FXOS CLI, the network administrator can follow these steps5:

Connect to the FXOS CLI using SSH or console.

Enter scope eth-uplink command to enter Ethernet uplink mode.

Enter create port-channel command to create an EtherChannel interface.

Enter a port-channel ID (1-48) and a mode (on or active) for the EtherChannel interface.

Enter add interface command to add physical interfaces to the EtherChannel interface.

Enter one or more interface IDs (for example, 1/1) for the physical interfaces.

Enter commit-buffer command to save the changes.

The other options are incorrect because:

The FMC CLI does not provide any commands to create an EtherChannel interface on a Firepower 9300 appliance.The FMC CLI is mainly used for managing FMC settings such as backup, restore, upgrade, troubleshoot, and so on7.

The FTD CLI does not provide any commands to create an EtherChannel interface on a Firepower 9300 appliance.The FTD CLI is mainly used for managing FTD settings such as routing, NAT, VPN, access control, and so on8.

The FMC GUI does not provide any options to create an EtherChannel interface on a Firepower 9300 appliance.The FMC GUI is mainly used for managing FTD policies such as access control, intrusion, file, malware, and so on9.

An engineer Is configuring a Cisco FTD device to place on the Finance VLAN to provide additional protection tor company financial dat

a. The device must be deployed without requiring any changes on the end user workstations, which currently use DHCP lo obtain an IP address. How must the engineer deploy the device to meet this requirement?

A.

Deploy the device in routed mode and allow DHCP traffic in the access control policies.

A.

Deploy the device in routed mode and allow DHCP traffic in the access control policies.

Answers
B.

Deploy the device in routed made aid enable the DHCP Relay feature.

B.

Deploy the device in routed made aid enable the DHCP Relay feature.

Answers
C.

Deploy the device in transparent mode and allow DHCP traffic in the access control policies

C.

Deploy the device in transparent mode and allow DHCP traffic in the access control policies

Answers
D.

Deploy the device in transparent mode and enable the DHCP Server feature.

D.

Deploy the device in transparent mode and enable the DHCP Server feature.

Answers
Suggested answer: C

Explanation:

Transparent mode allows the FTD device to act as a ''bump in the wire'' that does not affect the IP addressing of the network. The end user workstations will not need any changes to their configuration, as they will still receive an IP address from the same DHCP server.However, the FTD device must allow DHCP traffic in the access control policies, otherwise it will block the DHCP requests and replies1

A consultant Is working on a project where the customer is upgrading from a single Cisco Firepower 2130 managed by FDM to a pair of Cisco Firepower 2130s managed oy FMC tor nigh availability. The customer wants the configures of the existing device being managed by FDM to be carried over to FMC and then replicated to the additional: device being added to create the high availability pair. Which action must the consultant take to meet this requirement?

A.

The current FDM configuration must be configured by hand into FMC before the devices are registered.

A.

The current FDM configuration must be configured by hand into FMC before the devices are registered.

Answers
B.

The current FDM configuration will be converted automatically into FMC when the device registers.

B.

The current FDM configuration will be converted automatically into FMC when the device registers.

Answers
C.

The current FDM configuration must be migrated to FMC using the Secure Firewall Migration Tool.

C.

The current FDM configuration must be migrated to FMC using the Secure Firewall Migration Tool.

Answers
D.

The FTD configuration must be converted to ASA command format, which can then be migrated to FMC.

D.

The FTD configuration must be converted to ASA command format, which can then be migrated to FMC.

Answers
Suggested answer: B

Explanation:

When an FTD device that is managed by FDM is registered to FMC, the existing configuration is automatically converted and imported into FMC. The FMC then pushes the configuration back to the device. This process preserves most of the FDM configuration, except for some features that are not supported by FMC, such as VPN wizards and certificates.

An engineer plans to reconfigure an existing Cisco FTD from transparent mode to routed mode. Which additional action must be taken to maintain communication Between me two network segments?

A.

Configure a NAT rule so mat traffic between the segments is exempt from NAT.

A.

Configure a NAT rule so mat traffic between the segments is exempt from NAT.

Answers
B.

Update the IP addressing so that each segment is a unique IP subnet.

B.

Update the IP addressing so that each segment is a unique IP subnet.

Answers
C.

Deploy inbound ACLs on each interface to allow traffic between the segments.

C.

Deploy inbound ACLs on each interface to allow traffic between the segments.

Answers
D.

Assign a unique VLAN ID for the interface in each segment.

D.

Assign a unique VLAN ID for the interface in each segment.

Answers
Suggested answer: B

Explanation:

When reconfiguring an existing Cisco FTD from transparent mode to routed mode, an additional action that must be taken to maintain communication between the two network segments is to update the IP addressing so that each segment is a unique IP subnet. This is because in routed mode, the FTD device acts as a router hop in the network and requires each interface to be on a different subnet.In transparent mode, the FTD device acts as a layer 2 firewall and does not require different subnets for each interface1.

The other options are incorrect because:

Configuring a NAT rule so that traffic between the segments is exempt from NAT is not necessary to maintain communication between the two network segments. NAT is used to translate IP addresses between different networks, but it does not affect the routing of packets.Moreover, NAT is optional in routed mode and can be disabled if not needed2.

Deploying inbound ACLs on each interface to allow traffic between the segments is not required to maintain communication between the two network segments. ACLs are used to control access to network resources based on source and destination addresses, protocols, and ports. They do not affect the routing of packets.Furthermore, ACLs are optional in routed mode and can be configured as needed3.

Assigning a unique VLAN ID for the interface in each segment is not relevant to maintain communication between the two network segments. VLANs are used to create logical groups of hosts that share the same broadcast domain, regardless of their physical location or connection. They do not affect the routing of packets.Besides, VLANs are not supported in routed mode and can only be used in transparent mode4.

A network administrator reviews me attack risk report and notices several Low-Impact attacks. What does this type of attack indicate?

A.

All attacks are listed as low until manually categorized.

A.

All attacks are listed as low until manually categorized.

Answers
B.

The host is not vulnerable to those attacks.

B.

The host is not vulnerable to those attacks.

Answers
C.

The attacks are not dangerous to the network.

C.

The attacks are not dangerous to the network.

Answers
D.

The host is not within the administrator's environment.

D.

The host is not within the administrator's environment.

Answers
Suggested answer: B

Explanation:

A low-impact attack indicates that the host is not vulnerable to those attacks.A low-impact attack is an attack that does not exploit any known vulnerability on the target host or does not match any signature or anomaly rule on the FTD device5. A low-impact attack does not mean that the attack is not dangerous to the network or that the host is not within the administrator's environment. It simply means that the attack did not succeed in compromising or affecting the host.

The other options are incorrect because:

All attacks are not listed as low until manually categorized.The FTD device automatically assigns an impact level to each attack based on various factors, such as vulnerability information, threat score, and confidence rating5. The impact level can be high, medium, or low, depending on how likely and how severe the attack is.

The attacks are not necessarily harmless to the network.A low-impact attack may still cause some damage or disruption to the network, such as consuming bandwidth, generating noise, or distracting attention from other attacks6.A low-impact attack may also indicate that the attacker is probing or scanning the network for potential vulnerabilities or weaknesses7.

The host is not necessarily outside the administrator's environment. A low-impact attack can target any host on the network, regardless of its location or ownership. A low-impact attack does not imply that the host is external or irrelevant to the administrator's environment.

When an engineer captures traffic on a Cisco FTD to troubleshoot a connectivity problem, they receive a large amount of output data in the GUI tool. The engineer found that viewing the Captures this way is time-consuming and difficult lo son and filter. Which file type must the engineer export the data in so that it can be reviewed using a tool built for this type of analysis?

A.

NetFlow v9

A.

NetFlow v9

Answers
B.

PCAP

B.

PCAP

Answers
C.

NetFlow v5

C.

NetFlow v5

Answers
D.

IPFIX

D.

IPFIX

Answers
Suggested answer: B

Explanation:

When capturing traffic on a Cisco FTD device to troubleshoot a connectivity problem, a file type that can be exported for reviewing using a tool built for this type of analysis is PCAP.PCAP stands for Packet Capture and it is a file format used to store network packet data captured from a network interface8.PCAP files contain the raw data of network packets, including the headers and payloads of each packet8.

PCAP files are widely used in network analysis and troubleshooting tasks.They enable network administrators, analysts, and researchers to inspect and analyze network traffic for various purposes, such as diagnosing network issues, detecting malicious activity, measuring network performance, and understanding network protocols8.PCAP files can be read by applications that understand that format, such as Wireshark, tcpdump, CA NetMaster, or Microsoft Network Monitor8.

The other options are incorrect because:

NetFlow v9 is not a file type, but a protocol for collecting and exporting information about network flows.A network flow is a sequence of packets that share common attributes such as source and destination IP addresses, ports, and protocols9.NetFlow v9 records contain summary information about network flows, such as start and end times, byte counts, packet counts, and so on9. NetFlow v9 records do not contain the raw data of network packets.

NetFlow v5 is not a file type, but an earlier version of the NetFlow protocol for collecting and exporting information about network flows.NetFlow v5 records contain similar information as NetFlow v9 records, but with fewer fields and less flexibility10. NetFlow v5 records do not contain the raw data of network packets.

IPFIX is not a file type, but a protocol for collecting and exporting information about network flows.IPFIX stands for IP Flow Information Export and it is based on NetFlow v9, but with some extensions and improvements11.IPFIX records contain similar information as NetFlow v9 records, but with more fields and more flexibility11. IPFIX records do not contain the raw data of network packets.

Network users are experiencing Intermittent issues with internet access. An engineer ident med mat the issue Is being caused by NAT exhaustion. How must the engineer change the dynamic NAT configuration to provide internet access for more users without running out of resources?

A.

Define an additional static NAT for the network object in use.

A.

Define an additional static NAT for the network object in use.

Answers
B.

Configure fallthrough to interface PAT on 'he Advanced tab.

B.

Configure fallthrough to interface PAT on 'he Advanced tab.

Answers
C.

Convert the dynamic auto NAT rule to dynamic manual NAT.

C.

Convert the dynamic auto NAT rule to dynamic manual NAT.

Answers
D.

Add an identity NAT rule to handle the overflow of users.

D.

Add an identity NAT rule to handle the overflow of users.

Answers
Suggested answer: B

Explanation:

Fallthrough to interface PAT is a feature that allows the dynamic NAT configuration to use the interface IP address as a last resort when the NAT pool is exhausted. This way, more users can access the internet without running out of resources.To enable this feature, the engineer must check the Enable PAT Fallback check box on the Advanced tab of the NAT rule editor1

An engineer is configuring a custom intrusion rule on Cisco FMC. The engineer needs the rule to search the payload or stream for the string '|45 5* 26 27 4 0A|*. Which Keyword must the engineer use with this stung lo create an argument for packed inspection?

A.

metadata

A.

metadata

Answers
B.

Content

B.

Content

Answers
C.

Protected _ content

C.

Protected _ content

Answers
D.

data

D.

data

Answers
Suggested answer: B

Explanation:

The content keyword is used to specify a string or pattern to search for in the payload or stream of a packet. The string must be enclosed in quotation marks and can use modifiers such as nocase, depth, offset, and so on. The string can also use hexadecimal notation by using a pipe symbol (|) before and after the hexadecimal characters. For example, content:'|45 5* 26 27 4 0A|' will match any payload or stream that contains the hexadecimal bytes 45 526 27 4 0A followed by any number of bytes2

A network administrator is reviewing a weekly scheduled attacks risk report and notices a host that is flagged for an impact 2 attack. Where should the administrator look within Cisco FMC to find out more relevant information about this host and attack?

A.

Analysis > Lookup > Whols

A.

Analysis > Lookup > Whols

Answers
B.

Analysis > Correlation > Correlation Events

B.

Analysis > Correlation > Correlation Events

Answers
C.

Analysis > Hosts > Vulnerabilities

C.

Analysis > Hosts > Vulnerabilities

Answers
D.

Analysis > Hosts > Host Attributes

D.

Analysis > Hosts > Host Attributes

Answers
Suggested answer: C

Explanation:

The Analysis > Hosts > Vulnerabilities page in Cisco FMC displays information about the hosts on the network and their associated vulnerabilities. The administrator can filter the hosts by impact level, which indicates how likely an attack is to succeed against a host. An impact level of 2 means that the host was attacked and is potentially vulnerable, but no exploit was confirmed. The administrator can click on a host to view more details, such as its IP address, operating system, applications, protocols, and intrusion events.The administrator can also view the details of each vulnerability, such as its CVE ID, description, severity, and recommended actions3

Total 326 questions
Go to page: of 33