ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











Which action must be taken to configure an isolated bridge group for IRB mode on a Cisco Secure Firewall device?

A.

Add the restricted segment to the ACL.

A.

Add the restricted segment to the ACL.

Answers
B.

Leave BVI interface name empty.

B.

Leave BVI interface name empty.

Answers
C.

Define the NAT pool for the blocked traffic.

C.

Define the NAT pool for the blocked traffic.

Answers
D.

Remove the route from the routing table.

D.

Remove the route from the routing table.

Answers
Suggested answer: B

Explanation:

To configure an isolated bridge group for Integrated Routing and Bridging (IRB) mode on a Cisco Secure Firewall device, the action to take is to leave the BVI (Bridge Virtual Interface) interface name empty. This ensures that the bridge group operates in an isolated manner, where Layer 3 routing is not applied to the bridged interfaces, effectively isolating the traffic within the bridge group.

Steps:

Access the firewall's configuration interface.

Configure the bridge group interfaces.

Ensure that the BVI interface name is left empty to isolate the bridge group.

This configuration prevents Layer 3 routing for the isolated bridge group, ensuring that traffic remains contained within the bridge group.

An administrator must fix a network problem whereby traffic from the inside network to a webserver is not getting through an instance of Cisco Secure Firewall Threat Defense. Which command must the administrator use to capture packets to the webserver that are dropped by Secure Firewall Throat Defense and resold the issue?

A.

capture CAP int OUTSIDE match ip any host WEBSERVERIP

A.

capture CAP int OUTSIDE match ip any host WEBSERVERIP

Answers
B.

capture CAP type asp-drop all headers-only

B.

capture CAP type asp-drop all headers-only

Answers
C.

capture CAP int INSIDE match ip any host WEBSERVERIP

C.

capture CAP int INSIDE match ip any host WEBSERVERIP

Answers
D.

capture CAP int INSIDE match tcp any 80 host WEBSERVERlP 80

D.

capture CAP int INSIDE match tcp any 80 host WEBSERVERlP 80

Answers
Suggested answer: B

Explanation:

To capture packets that are dropped by Cisco Secure Firewall Threat Defense (FTD) and troubleshoot the issue of traffic from the inside network to a webserver not getting through, the administrator should use the command to capture packets dropped by the accelerated security path (ASP) engine. The correct command is:

capture CAP type asp-drop all headers-only

This command captures all packets dropped by the ASP engine, which includes packets that are being blocked by access control policies, NAT issues, or other security checks.

Steps:

Access the FTD CLI.

Run the command capture CAP type asp-drop all headers-only to capture dropped packets.

Analyze the captured data to identify the cause of the drops.

This command provides detailed information on why packets are being dropped, helping the administrator resolve the issue.

What is the role of realms in the Cisco ISE and Cisco FMC integration?

A.

AD definition

A.

AD definition

Answers
B.

TACACS+ database

B.

TACACS+ database

Answers
C.

Cisco ISE context

C.

Cisco ISE context

Answers
D.

Cisco Secure Firewall VDC

D.

Cisco Secure Firewall VDC

Answers
Suggested answer: A

Explanation:

In the integration between Cisco Identity Services Engine (ISE) and Cisco Firewall Management Center (FMC), realms are used to define the Active Directory (AD) configuration. Realms in FMC specify the AD servers, domain, and other authentication settings necessary to authenticate and authorize users.

Steps to configure realms:

In FMC, navigate to System > Integration > Realms and Directory.

Add a new realm and configure the AD settings.

Ensure the realm settings match the AD environment for seamless integration.

Realms are essential for integrating AD with FMC, allowing the firewall to use AD for user authentication and policy enforcement.


A network administrator is trying to configure Active Directory authentication for VPN authentication to a Cisco Secure Firewall Threat Defence instance that is registered with Cisco Secure Firewall Management Center. Which system settings must be configured first in Secure Firewall Management Center to accomplish the goal?

A.

Device, Remote Access VPN

A.

Device, Remote Access VPN

Answers
B.

System, Realms

B.

System, Realms

Answers
C.

Policies, Authentication

C.

Policies, Authentication

Answers
D.

Authentication, Device

D.

Authentication, Device

Answers
Suggested answer: B

Explanation:

To configure Active Directory authentication for VPN authentication on a Cisco Secure Firewall Threat Defense (FTD) instance registered with Cisco Secure Firewall Management Center (FMC), the administrator needs to configure Realms in the System settings of the FMC. Realms in FMC are used to define the directory servers (e.g., Active Directory) and how they are used for user authentication.

Steps to configure this in FMC:

Navigate to System > Integration > Realms and Directory.

Add a new realm and configure the necessary details such as the directory server type (e.g., Active Directory), server address, and bind credentials.

Test the connection to ensure it works correctly.

This setup allows the FMC to authenticate VPN users against the Active Directory, thereby enabling secure access control for VPN connections.

A network administrator is trying to configure an access rule to allow access to a specific banking site over HTTPS. Which method must the administrator use to meet the requirement?

A.

Enable SSL decryption and specify the URL.

A.

Enable SSL decryption and specify the URL.

Answers
B.

Define the URL to be blocked and set the application to HTTP.

B.

Define the URL to be blocked and set the application to HTTP.

Answers
C.

Define the URL to be blocked and disable SSL inspection.

C.

Define the URL to be blocked and disable SSL inspection.

Answers
D.

Block the category of banking and define the application of WWW.

D.

Block the category of banking and define the application of WWW.

Answers
Suggested answer: A

Explanation:

To allow access to a specific banking site over HTTPS, the network administrator must use SSL decryption (also known as SSL/TLS inspection) and specify the URL. This is because HTTPS traffic is encrypted, and the firewall needs to decrypt the traffic to inspect the URL and enforce the access rule.

Steps:

Enable SSL Decryption: Configure SSL policies to decrypt the HTTPS traffic.

Specify the URL: Define the URL of the banking site in the access control policy, ensuring that the decrypted traffic is inspected and allowed based on the specified URL.

This method ensures that only the desired banking site is accessed over HTTPS, while other HTTPS traffic can be filtered or blocked according to the organization's security policies.

An engineer is configuring a Cisco Secure Firewall Threat Defence device managed by Cisco Secure Firewall Management Centre. The device must have SSH enabled and the accessible from the inside interface for remote administration. Which type of policy must the engineer configure to accomplish this?

A.

Identify

A.

Identify

Answers
B.

Access control

B.

Access control

Answers
C.

Prefilter

C.

Prefilter

Answers
D.

Platform settings

D.

Platform settings

Answers
Suggested answer: D

Explanation:

To enable SSH access to a Cisco Secure Firewall Threat Defense (FTD) device from the inside interface for remote administration, the engineer needs to configure a Platform Settings policy in Cisco Secure Firewall Management Center (FMC). The Platform Settings policy allows the configuration of various system-related settings, including enabling SSH, specifying the allowed interfaces, and defining the SSH access parameters.

Steps:

In FMC, navigate to Policies > Access Control > Platform Settings.

Create a new Platform Settings policy or edit an existing one.

In the policy settings, go to the SSH section.

Enable SSH and specify the inside interface as the allowed interface for SSH access.

Define the SSH parameters such as allowed IP addresses, user credentials, and other security settings.

Save and deploy the policy to the FTD device.

This configuration ensures that SSH access is enabled on the specified interface, allowing secure remote administration.

Which component simplifies incident investigation with Cisco Threat Response?

A.

Cisco AMP client

A.

Cisco AMP client

Answers
B.

local CVE database

B.

local CVE database

Answers
C.

Cisco Secure Firewall appliance

C.

Cisco Secure Firewall appliance

Answers
D.

browser plug-in

D.

browser plug-in

Answers
Suggested answer: D

Explanation:

Cisco Threat Response (CTR) is a security solution that helps simplify incident investigation and threat hunting. One of its components that significantly simplifies the investigation process is the browser plug-in. The browser plug-in integrates with CTR to provide contextual information directly within the browser, allowing security analysts to quickly view threat details, pivot to related information, and take appropriate actions without switching between multiple tools.

Features of the browser plug-in:

Provides real-time threat intelligence and context from various Cisco security products.

Allows security analysts to investigate incidents directly from web-based consoles.

Enhances efficiency by streamlining the workflow and reducing the time needed to gather and correlate information.

Refer to the exhibit.

A company is deploying a pair of Cisco Secure Firewall Threat defence devices named FTD1 and FTD2. FTD1 and FTD2 have been configured as an active/standby pair with a failover link but without a stateful link. What must be implemented next to ensure that users on the internal network still communicate with outside devices if FTD1 fails?

A.

Disable port security on the switch interfaces connected to FTD1 and FTD2.

A.

Disable port security on the switch interfaces connected to FTD1 and FTD2.

Answers
B.

Set maximum secured addresses to two on the switch interfaces on FTD1 and FTD2.

B.

Set maximum secured addresses to two on the switch interfaces on FTD1 and FTD2.

Answers
C.

Connect and configure a stateful link and thon deploy the changes.

C.

Connect and configure a stateful link and thon deploy the changes.

Answers
D.

Configure the spanning-tree PortFasI feature on SW1 and FTD2

D.

Configure the spanning-tree PortFasI feature on SW1 and FTD2

Answers
Suggested answer: C

Explanation:

In a failover configuration with Cisco Secure Firewall Threat Defense (FTD) devices, ensuring that users on the internal network can continue to communicate with outside devices if the primary device (FTD1) fails requires the implementation of a stateful failover link. The stateful failover link allows the secondary device (FTD2) to maintain session information and state data, ensuring seamless failover and minimizing disruptions.

Steps to implement a stateful failover link:

Physically connect a stateful failover link between FTD1 and FTD2.

Configure the stateful failover link in the FMC.

Ensure that both devices are properly synchronized and that stateful failover is enabled.

Deploy the changes to both FTD devices.

By configuring a stateful link, the secondary FTD can take over active sessions without requiring users to re-establish their connections, thus ensuring continuous communication.

A network engineer must configure IPS mode on a Cisco Secure firewall Threat Defense device to inspect traffic and act as an IDS. The engineer already configured the passive-interface on the secure firewall threat Defence device and SPAN on the switch. What must be configured next by the engineer?

A.

intrusion policy on the Secure Firewall Threat Defense device

A.

intrusion policy on the Secure Firewall Threat Defense device

Answers
B.

active Interface on me Secure Firewall threat Defense device

B.

active Interface on me Secure Firewall threat Defense device

Answers
C.

DHCP on the switch

C.

DHCP on the switch

Answers
D.

active SPAN port on the switch

D.

active SPAN port on the switch

Answers
Suggested answer: A

Explanation:

To configure IPS mode on a Cisco Secure Firewall Threat Defense (FTD) device to inspect traffic and act as an IDS, the network engineer must configure an intrusion policy on the FTD device. The passive-interface and SPAN on the switch have already been configured, which means the traffic is being mirrored to the FTD. The next step is to set up an intrusion policy that defines the rules and actions for detecting and responding to malicious traffic.

Steps:

In FMC, navigate to Policies > Intrusion.

Create a new intrusion policy or edit an existing one.

Define the rules and actions for detecting threats.

Apply the intrusion policy to the relevant interfaces or access control policies.

This configuration enables the FTD to inspect the mirrored traffic and take appropriate actions based on the defined intrusion policy.

An administrator is attempting to add a Cisco Secure Firewall Threat Defence device to Cisco Secure Firewall Management Center with a password of Cisco0480846211 480846211. The private IP address of the FMC server is 192.168.75.201. Which command must be used in order to accomplish this task?

A.

configure manager add 192.168.75.201/24 <reg_key>

A.

configure manager add 192.168.75.201/24 <reg_key>

Answers
B.

configure manager add 192.16875.201 <reg_key>

B.

configure manager add 192.16875.201 <reg_key>

Answers
C.

configure manager add 192.168.45.45 <reg_key> <nal-ld>

C.

configure manager add 192.168.45.45 <reg_key> <nal-ld>

Answers
D.

configure manager add 192.168.75.201 255.255.255.0 <reg_key>

D.

configure manager add 192.168.75.201 255.255.255.0 <reg_key>

Answers
Suggested answer: B

Explanation:

To add a Cisco Secure Firewall Threat Defense (FTD) device to Cisco Secure Firewall Management Center (FMC), the correct command to use is configure manager add 192.168.75.201 <reg_key>. This command registers the FTD device with the FMC using the FMC's IP address and the registration key provided during the FMC setup.

Command structure:

configure manager add <FMC_IP> <reg_key>

For the given scenario:

FMC IP address: 192.168.75.201

Registration key: provided during FMC setup

Thus, the correct command is:

configure manager add 192.168.75.201 <reg_key>

Total 326 questions
Go to page: of 33