Cisco 300-710 Practice Test - Questions Answers, Page 28
List of questions
Related questions
An engineer must deploy a Cisco FTD device. Management wants to examine traffic without requiring network changes that will disrupt end users. Corporate security policy requires the separation of management traffic from data traffic and the use of SSH over Telnet for remote administration. How must the device be deployed to meet these requirements?
in routed mode with a diagnostic interface
in transparent mode with a management Interface
in transparent made with a data interface
in routed mode with a bridge virtual interface
An engineer is configuring URL filtering for a Cisco FTD device in Cisco FMC. Users must receive a warning when they access http:/'www.Dac'additstte.corn with the option of continuing to the website if they choose to. No other websites should be blacked. Which two actions must the engineer lake to meet these requirements? (Choose two.)
On the HTTP Responses tab of the access control policy editor, set the Block Response Page to Custom.
On the HTTP Responses tab of the access control policy editor, sot the Interactive Block Response Page to system-provided.
Configure the default action for the access control policy to Interactive Block.
Configure an access control rule that matches the Adult URL category and se: the action to interactive Block.
Configure an access control rule that matches an URL object for http://www.badaduitslte.com; and set the action to interactive Block.
A network administrator is reviewing a monthly advanced malware risk report and notices a host that Is listed as CnC Connected. Where must the administrator look within Cisco FMC to further determine if this host is infected with malware?
Analysis > Hosts > indications of Compromise
Analysts > Files > Malware Events
Analysis > Hosts > Host Attributes
Analysis > Flies > Network File Trajectory
An engineer is configuring a custom application detector for HTTP traffic and wants to import a file that was provided by a third party. Which type of flies are advanced application detectors creates and uploaded as?
Perl script
NBAR protocol
LUA script
Python program
An engineer must investigate a connectivity issue from an endpoint behind a Cisco FTD device and a public DNS server. The endpoint cannot perform name resolution queries. Which action must the engineer perform to troubleshoot the issue by simulating real DNS traffic on the Cisco FTD while verifying the Snarl verdict?
Perform a Snort engine capture using tcpdump from the FTD CLI.
Use the Capture w/Trace wizard in Cisco FMC.
Create a Custom Workflow in Cisco FMC.
Run me system support firewall-engine-debug command from me FTD CLI.
DRAG DROP
Drag and drop the configuration steps from the left into the sequence on the right to enable external authentication on Cisco FMC to a RADIUS server.
What is a limitation to consider when running a dynamic routing protocol on a Cisco FTD device in IRB mode?
Only link-stale routing protocols are supported.
Only distance vector routing protocols are supported.
Only EtherChannel interfaces are supposed.
Only nonbridge interfaces are supported.
DRAG DROP
A network engineer is deploying a Cisco Firepower 4100 appliance and must configure a multi-instance environment for high availability. Drag and drop me actions from the left into sequence on the right far this configuration.
An engineer is attempting to create a new dashboard within the Cisco FMC to have a single view with widgets from many of the other dashboards. The goal is to have a mixture of threat and security related widgets along with Cisco
Firepower device health information. Which two widgets must be configured to provide this information? (Choose two).
Intrusion Events
Correlation Information
Appliance Status
Current Sessions
Network Compliance
An engineer must create an access control policy on a Cisco Secure Firewall Threat Defense device. The company has a contact center that utilizes VoIP heavily, and it is critical that this traffic is not .... by performance issues after deploying the access control policy Which access control Action rule must be configured to handle the VoIP traffic?
monitor
trust
block
allow
Question