ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











A cisco Secure firewall Threat Defence device is configured in inline IPS mode to inspect all traffic that passes through the interfaces in the inline set. Which setting in the inline set configuration must be connected to allow traffic to pass through uninterrupted when VDB updates are being applied?

A.

Propagate Link State

A.

Propagate Link State

Answers
B.

Short Fall Open

B.

Short Fall Open

Answers
C.

Strict TCP Enforcement

C.

Strict TCP Enforcement

Answers
D.

Tap Mode

D.

Tap Mode

Answers
Suggested answer: B

Explanation:

In inline IPS mode, to ensure that traffic passes through uninterrupted when VDB (Vulnerability Database) updates are being applied, the 'Short Fall Open' setting must be configured. This setting allows traffic to continue to flow through the firewall even if there are issues with the inspection process, such as during updates or if the inspection engine fails.

Steps:

In FMC, navigate to the inline set configuration.

Enable the 'Short Fall Open' option.

Deploy the configuration to the FTD device.

This ensures that network traffic is not disrupted during updates or other issues with the inspection process.

When packet capture is used on a Cisco Secure Firewall Threat Defense device and the packet flow is wailing on the malware query, which Snort verdict appears?

A.

retry

A.

retry

Answers
B.

replace

B.

replace

Answers
C.

block

C.

block

Answers
D.

blocfcflow

D.

blocfcflow

Answers
Suggested answer: A

Explanation:

When packet capture is used on a Cisco Secure Firewall Threat Defense (FTD) device and the packet flow is waiting on the malware query, the Snort verdict appears as 'retry.' This indicates that the device is still processing the malware analysis and has not yet determined the final action for the packet.

The 'retry' verdict signifies that the packet is in a holding state while awaiting the result of the malware inspection, which helps in maintaining the security posture until a definitive decision is made.

An engineer is configuring URL filtering tor a Cisco Secure Firewall Threat Defense device in Cisco Secure Firewall Management Centre. Use's must receive a warning when they access ..wwww badaduitsito com with the option of continuing to the website if they choose to No other websites should he blocked. Which two actions must the engineer take to moot these requirements?

A.

Configure an access control rule that matches an URL object for http://www.Dadadullsile.com' and set the action to Interactive Block.

A.

Configure an access control rule that matches an URL object for http://www.Dadadullsile.com' and set the action to Interactive Block.

Answers
B.

On the HTTP Responses tab of the access control policy editor, set the Interactive Block Response Page to System-provided.

B.

On the HTTP Responses tab of the access control policy editor, set the Interactive Block Response Page to System-provided.

Answers
C.

Configure the default action for the access control policy to Interactive Block.

C.

Configure the default action for the access control policy to Interactive Block.

Answers
D.

On the HTTP Responses tab of the access control policy editor set the Block Response Page to Custom.

D.

On the HTTP Responses tab of the access control policy editor set the Block Response Page to Custom.

Answers
E.

Configure an access control rule that matches the Adult URL category and sot the action to Interactive Block

E.

Configure an access control rule that matches the Adult URL category and sot the action to Interactive Block

Answers
Suggested answer: A, B

Explanation:

To configure URL filtering such that users receive a warning when they access a specific website (e.g., http://www.badadultsite.com) and have the option to continue to the site, the engineer needs to perform the following actions:

Configure an access control rule:

Create a URL object for http://www.badadultsite.com.

Set the action for this URL object to 'Interactive Block,' which prompts the user with a warning and allows them to proceed if they choose to.

Set the Interactive Block Response Page:

Navigate to the HTTP Responses tab in the access control policy editor.

Set the Interactive Block Response Page to 'System-provided' to ensure that users see the default warning page provided by Cisco Secure Firewall Management Center.

These actions ensure that only the specified website triggers an interactive block, while other websites are not blocked.

Encrypted Visibility Engine (EVE) is enabled under which lab on an access control policy in Cisco Secure Firewall Management Centre?

A.

Network Analysis Policy

A.

Network Analysis Policy

Answers
B.

Advanced

B.

Advanced

Answers
C.

Security Intelligence

C.

Security Intelligence

Answers
D.

SSL

D.

SSL

Answers
Suggested answer: D

Explanation:

The Encrypted Visibility Engine (EVE) in Cisco Secure Firewall Management Center is enabled under the SSL tab of an access control policy. EVE provides visibility into encrypted traffic, allowing the firewall to detect threats even when traffic is encrypted.

Steps to enable EVE:

Navigate to the access control policy in FMC.

Go to the SSL tab.

Enable Encrypted Visibility Engine (EVE) to analyze encrypted traffic.

This configuration helps in identifying and mitigating threats within encrypted traffic without the need for full decryption.

A company is deploying Cisco Secure Endpoint private cloud. The Secure Endpoint private cloud instance has already been deployed by the server administrator. The server administrator provided the hostname of the private cloud instance to the network engineer via email. What additional information does the network engineer require from the server administrator to be able to make the connection to Secure Endpoint private cloud in Cisco Secure Firewall Management Centre?

A.

SSL certificate for the Secure Endpoint ornate cloud instance

A.

SSL certificate for the Secure Endpoint ornate cloud instance

Answers
B.

Internet access for the Secure End point private cloud to reach the Secure Endpoint public cloud

B.

Internet access for the Secure End point private cloud to reach the Secure Endpoint public cloud

Answers
C.

Username and password to the Secure Endpoint private cloud instance

C.

Username and password to the Secure Endpoint private cloud instance

Answers
D.

IP address and port number for the connection proxy

D.

IP address and port number for the connection proxy

Answers
Suggested answer: A

Explanation:

To connect to a Secure Endpoint private cloud instance from Cisco Secure Firewall Management Center (FMC), the network engineer requires the SSL certificate for the Secure Endpoint private cloud instance. This SSL certificate is necessary to establish a secure, trusted connection between the FMC and the private cloud instance.

Steps:

Obtain the SSL certificate from the server administrator.

Import the SSL certificate into the FMC.

Configure the connection to the Secure Endpoint private cloud instance using the provided hostname and SSL certificate.

This ensures a secure and authenticated connection to the private cloud instance.

Network users experience issues when accessing a server on a different network segment. An engineer investigates the issue by performing packet capture on Cisco Secure Firewall Threat Defense. The engineer expects more data and suspects that not all the traffic was collected during a 15-minute can't captured session. Which action must the engineer take to resolve the issue?

A.

Forward the captured data lo an FTP server

A.

Forward the captured data lo an FTP server

Answers
B.

Increase the amount of RAM allocated for the capture.

B.

Increase the amount of RAM allocated for the capture.

Answers
C.

Provide a file name to save the data.

C.

Provide a file name to save the data.

Answers
D.

Ensure that the allocated memory is sufficient.

D.

Ensure that the allocated memory is sufficient.

Answers
Suggested answer: D

Explanation:

When performing packet capture on a Cisco Secure Firewall Threat Defense (FTD) device, ensuring that the allocated memory is sufficient is crucial for capturing all necessary traffic during a specified capture session. If users experience issues accessing a server and the engineer suspects not all traffic was collected, it indicates that the current memory allocation might not be enough to store the entire capture data for the 15-minute session.

Steps:

Check the current memory allocation for packet captures on the FTD device.

Increase the memory allocation if it is insufficient to handle the volume of traffic expected during the capture session.

This ensures that all relevant traffic is captured and can be analyzed to diagnose and resolve the network issue.

Users report that Cisco Duo 2FA fails when they attempt to connect to the VPN on a Cisco Secure Firewall Threat Defense (FTD) device IT staff have VPN profiles that do not require multifactor authentication and they can connect to the VPN without any issues When viewing the VPN troubleshooting log in Cisco Secure Firewall Management Centre (FMC), the network administrator sees an error in the Cisco Duo AAA server has been marked as tailed. What is the root cause of the Issue?

A.

Multifactor authentication Is not supported on Secure FMC managed devices.

A.

Multifactor authentication Is not supported on Secure FMC managed devices.

Answers
B.

Duo trust certificates are missing from the Secure FTD device.

B.

Duo trust certificates are missing from the Secure FTD device.

Answers
C.

The internal AD server is unreachable from the Secure FTD device.

C.

The internal AD server is unreachable from the Secure FTD device.

Answers
D.

AD Trust certificates are missing from the Secure FTD device.

D.

AD Trust certificates are missing from the Secure FTD device.

Answers
Suggested answer: B

Explanation:

If users report that Cisco Duo 2FA fails when attempting to connect to the VPN on a Cisco Secure Firewall Threat Defense (FTD) device, and the VPN troubleshooting log in FMC shows an error indicating that the Cisco Duo AAA server has been marked as failed, the root cause is likely missing Duo trust certificates on the FTD device. Trust certificates are essential for establishing a secure and trusted connection between the FTD and the Duo authentication service.

Steps:

Obtain the necessary Duo trust certificates.

Install the certificates on the FTD device.

Verify the configuration to ensure that the FTD device can properly communicate with the Duo AAA server.

This resolves the authentication failure by ensuring that the FTD device can trust the Duo server.

An engineer must change the mode of a Cisco Secure Firewall Threat Defense (FTD) firewall in the Cisco Secure Firewall Management Center (FMC) inventory. The engineer must take these actions:

* Register Secure FTD with Secure FMC.

* Change the firewall mode.

* Deregister the Secure FTD device from Secure FMC.

How must the engineer take FTD take the actions?

A.

Reload the Secure FTD device.

A.

Reload the Secure FTD device.

Answers
B.

Configure the management IP address.

B.

Configure the management IP address.

Answers
C.

Access the Secure FTD CLI from the console port.

C.

Access the Secure FTD CLI from the console port.

Answers
D.

Erase the Secure FTD configuration

D.

Erase the Secure FTD configuration

Answers
Suggested answer: C

Explanation:

To change the mode of a Cisco Secure Firewall Threat Defense (FTD) device in the Cisco Secure Firewall Management Center (FMC) inventory, the engineer must follow these steps:

Register the Secure FTD with Secure FMC.

Change the firewall mode.

Deregister the Secure FTD device from Secure FMC.

To perform these actions, accessing the Secure FTD CLI from the console port is necessary. This allows the engineer to execute the required commands to change the firewall mode and manage the registration status of the FTD device.

Steps:

Connect to the Secure FTD device via the console port.

Access the CLI and execute the command to change the firewall mode (configure firewall-mode).

Deregister the device from FMC if needed.

Register or re-register the device with FMC as required.

A network administrator wants to configure a Cisco Secure Firewall Threat Defense instance managed by Cisco Secure Firewall Management Center to block traffic to known cryptomning networks. Which system settings must the administrator configure in Secure Firewall Management Center to meet the requirement?

A.

Access Policy. Security Intelligence

A.

Access Policy. Security Intelligence

Answers
B.

Malware Policy.

B.

Malware Policy.

Answers
C.

Rules Intrusion Policy. Security Intelligence

C.

Rules Intrusion Policy. Security Intelligence

Answers
D.

Access Policy. Rules

D.

Access Policy. Rules

Answers
Suggested answer: A

Explanation:

To block traffic to known cryptomining networks using Cisco Secure Firewall Threat Defense (FTD) managed by Cisco Secure Firewall Management Center (FMC), the network administrator needs to configure Security Intelligence in an Access Control Policy. Security Intelligence allows administrators to block traffic based on threat intelligence feeds, which include known malicious IP addresses, domains, and URLs.

Steps:

Navigate to Policies > Access Control > Access Control Policy in FMC.

Edit or create an Access Control Policy.

Go to the Security Intelligence tab.

Enable the relevant threat intelligence feeds that include cryptomining networks.

Apply the policy to the FTD device.

This configuration ensures that traffic to known cryptomining networks is blocked, enhancing the network's security posture against cryptomining threats.

An administrator is configuring the interface of a Cisco Secure Firewall Threat Defense device in a passive IPS deployment. The device and interface have been identified. Which set of configuration steps of the administrator take next to complete the implementation?

A.

Set the interface mode to passive. Associate the interface with a security zone. Set the MTU parameter. Reset the interface.

A.

Set the interface mode to passive. Associate the interface with a security zone. Set the MTU parameter. Reset the interface.

Answers
B.

Modify the interface to retransmit received traffic. Associate the interface with a security zone Enable the interface. Sat the MTU parameter.

B.

Modify the interface to retransmit received traffic. Associate the interface with a security zone Enable the interface. Sat the MTU parameter.

Answers
C.

Modify the interface to retransmit received traffic. Associate the interface with a security zone. Set the MTU parameter.

C.

Modify the interface to retransmit received traffic. Associate the interface with a security zone. Set the MTU parameter.

Answers
D.

Set the interface mode to passive. Associate the interface with a security zone. Enable the interface. Set the MTU parameter.

D.

Set the interface mode to passive. Associate the interface with a security zone. Enable the interface. Set the MTU parameter.

Answers
Suggested answer: D

Explanation:

In a passive IPS deployment for a Cisco Secure Firewall Threat Defense (FTD) device, the administrator must configure the interface to operate in passive mode. This involves setting the interface mode, associating it with a security zone, enabling the interface, and setting the MTU parameter.

Steps:

Set the interface mode to passive:

In FMC, navigate to Devices > Device Management.

Select the FTD device and configure the relevant interface.

Set the interface mode to 'Passive.'

Associate the interface with a security zone:

Create or select an appropriate security zone.

Assign the passive interface to this security zone.

Enable the interface:

Ensure the interface is enabled to receive traffic.

Set the MTU parameter:

Configure the Maximum Transmission Unit (MTU) parameter as required.

This ensures that the FTD device can inspect traffic passively without impacting the network flow.

Total 326 questions
Go to page: of 33