Cisco 300-710 Practice Test - Questions Answers, Page 32
List of questions
Related questions
An engineer must replace a Cisco Secure Firewall high-availability device due to a failure. When the replacement device arrives, the engineer must separate the high-availability pair from Cisco Secure Firewall Management Center Which action must the engineer take first to restore high availability?
Register the secondary device
Force a break between the devices.
Unregister the secondary device.
Configure NTP time synchronization.
Refer to the exhibit.
A Cisco Secure Firewall Threat Defense (FTD) device is deployed in inline mode with an inline set. The network engineer wants router R2 to remove the directly connected route M 68.1.0/24 from its routing table when the cable between routed R1 and the Secure FTD device Is disconnected. Which action must the engineer take?
1
Implement the Propagate Link Stale option on the Secure FTD device
Establish a routing protocol between R1 and R2.
Disable hardware bypass on the Secure FTD device.
Implement autostate functionality on the Gi0/2 interface of R2
Which component is needed to perform rapid threat containment with Cisco FMC?
ISE
RESTful API
SIEM
DDI
A network administrator is deploying a new Cisco Secure Firewall Threat Defense (FTD) firewall After Cisco Secure FTD is deployed, inside clients nave intermittent connectivity to each other. When ... the packet capture on the Secure FTD firewall, the administrator sees that Secure FID is responding to all the AW requests on the inside network. Which action must the network administrator e to resolve the issue''
Review NAT policy and disable incorrect proxy ARP configuration.
Hardcode the MAC address of the FTD to IP mapping on client machines.
Review the access policy and verify that ARP is allowed from inside to inside.
Convert the FTD to transparent mode to allow ARP requests.
An organization created a custom application that is being flagged by Cisco Secure Endpoint. The application must be exempt from being flagged. What is the process to meet the requirement?
Modify the custom detection list to exclude me custom application.
Preculculate the hash value of the custom application and add it to the allowed applications.
Configure the custom application to use the information-store paths.
Add the custom application to the DFC 1st and update the policy.
What is the result when two users modify a VPN policy at the same lime on a Cisco Secure Firewall Management Center managed device?
Both users can edit the policy arid the last saved configuration persists.
The first user locks the configuration when selecting edit on the policy.
The changes from both users will be merged together into the policy.
The system prevents modifications to the policy by multiple users.
An engineer is configuring a Cisco Secure Firewall Threat Defense device and warns to create a new intrusion rule based on the detection of a specific pattern in the data payload for a new zero-day exploit. Which keyword type must be used to add a Line that identifies the author of the rule and the date it was created?
metadata
content
reference
gtp_info
Refer to the Exhibit.
A security engineer must improve security in an organization and is producing a risk mitigation strategy to present to management for approval. Which action must the security engineer take based on this Attacks Risk Report?
Inspect DNS traffic
Block NetBIOS.
Block Internal Explorer
Inspect TCP port 80 traffic
An engineer is troubleshooting an intermittent connectivity issue on a Cisco Secure Firewall Threat Defense appliance and must collect 24 hours' worth of data. The engineer started a packet capture. Whenever it stops prematurely during this time period. The engineer notices that the packet capture butter size is set to the default of 32 MB Which butter S170 is the maximum that the engineer must sot to able the packet capture to run successfully?
64 MB
1 GB
10 GB
100 GB
A security engineer manages a firewall console and an endpoint console and finds it challenging and the consuming to review events and modify blocking of specific files in both consoles. Which action must the engineer take to streamline this process?
From the Secure FMC. create a Cisco Secure Endpoint object and reference the object in the Cisco Secure Endpoint console.
From the Cisco Secure Endpoint console, Croats and copy an API key and paste into the Cisco Secure AMP tab
initiate the integration between Secure FMC and Cisco Secure Endpoint from the Secure FMC using the AMP tab
Within the Cisco Secure Endpoint console, copy the connector GUID and paste into the Cisco Secure Firewall Management Center (FMC) AMP tab.
Question