ExamGecko
Home / Cisco / 300-710 / List of questions
Ask Question

Cisco 300-710 Practice Test - Questions Answers, Page 30

Add to Whishlist

List of questions

Question 291

Report Export Collapse

A cisco Secure firewall Threat Defence device is configured in inline IPS mode to inspect all traffic that passes through the interfaces in the inline set. Which setting in the inline set configuration must be connected to allow traffic to pass through uninterrupted when VDB updates are being applied?

Become a Premium Member for full access
  Unlock Premium Member

Question 292

Report Export Collapse

When packet capture is used on a Cisco Secure Firewall Threat Defense device and the packet flow is wailing on the malware query, which Snort verdict appears?

Become a Premium Member for full access
  Unlock Premium Member

Question 293

Report Export Collapse

An engineer is configuring URL filtering tor a Cisco Secure Firewall Threat Defense device in Cisco Secure Firewall Management Centre. Use's must receive a warning when they access ..wwww badaduitsito com with the option of continuing to the website if they choose to No other websites should he blocked. Which two actions must the engineer take to moot these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 294

Report Export Collapse

Encrypted Visibility Engine (EVE) is enabled under which lab on an access control policy in Cisco Secure Firewall Management Centre?

Become a Premium Member for full access
  Unlock Premium Member

Question 295

Report Export Collapse

A company is deploying Cisco Secure Endpoint private cloud. The Secure Endpoint private cloud instance has already been deployed by the server administrator. The server administrator provided the hostname of the private cloud instance to the network engineer via email. What additional information does the network engineer require from the server administrator to be able to make the connection to Secure Endpoint private cloud in Cisco Secure Firewall Management Centre?

Become a Premium Member for full access
  Unlock Premium Member

Question 296

Report Export Collapse

Network users experience issues when accessing a server on a different network segment. An engineer investigates the issue by performing packet capture on Cisco Secure Firewall Threat Defense. The engineer expects more data and suspects that not all the traffic was collected during a 15-minute can't captured session. Which action must the engineer take to resolve the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 297

Report Export Collapse

Users report that Cisco Duo 2FA fails when they attempt to connect to the VPN on a Cisco Secure Firewall Threat Defense (FTD) device IT staff have VPN profiles that do not require multifactor authentication and they can connect to the VPN without any issues When viewing the VPN troubleshooting log in Cisco Secure Firewall Management Centre (FMC), the network administrator sees an error in the Cisco Duo AAA server has been marked as tailed. What is the root cause of the Issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 298

Report Export Collapse

An engineer must change the mode of a Cisco Secure Firewall Threat Defense (FTD) firewall in the Cisco Secure Firewall Management Center (FMC) inventory. The engineer must take these actions:

* Register Secure FTD with Secure FMC.

* Change the firewall mode.

* Deregister the Secure FTD device from Secure FMC.

How must the engineer take FTD take the actions?

Become a Premium Member for full access
  Unlock Premium Member

Question 299

Report Export Collapse

A network administrator wants to configure a Cisco Secure Firewall Threat Defense instance managed by Cisco Secure Firewall Management Center to block traffic to known cryptomning networks. Which system settings must the administrator configure in Secure Firewall Management Center to meet the requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 300

Report Export Collapse

An administrator is configuring the interface of a Cisco Secure Firewall Threat Defense device in a passive IPS deployment. The device and interface have been identified. Which set of configuration steps of the administrator take next to complete the implementation?

Become a Premium Member for full access
  Unlock Premium Member
Total 326 questions
Go to page: of 33
Search

Related questions