ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











An engineer must replace a Cisco Secure Firewall high-availability device due to a failure. When the replacement device arrives, the engineer must separate the high-availability pair from Cisco Secure Firewall Management Center Which action must the engineer take first to restore high availability?

A.

Register the secondary device

A.

Register the secondary device

Answers
B.

Force a break between the devices.

B.

Force a break between the devices.

Answers
C.

Unregister the secondary device.

C.

Unregister the secondary device.

Answers
D.

Configure NTP time synchronization.

D.

Configure NTP time synchronization.

Answers
Suggested answer: C

Explanation:

When replacing a Cisco Secure Firewall high-availability (HA) device due to a failure, the first step the engineer must take is to unregister the secondary (failed) device from the Cisco Secure Firewall Management Center (FMC). This action separates the HA pair and ensures that the new replacement device can be registered and configured correctly.

Steps:

Access the FMC and navigate to the device management section.

Unregister the failed secondary device to remove it from the HA pair.

Register the replacement device to the FMC.

Reconfigure the HA settings to restore the high-availability configuration.

By unregistering the failed device first, the engineer ensures a clean setup for the replacement device, avoiding potential conflicts or issues in the HA configuration.

Refer to the exhibit.

A Cisco Secure Firewall Threat Defense (FTD) device is deployed in inline mode with an inline set. The network engineer wants router R2 to remove the directly connected route M 68.1.0/24 from its routing table when the cable between routed R1 and the Secure FTD device Is disconnected. Which action must the engineer take?

1

A.

Implement the Propagate Link Stale option on the Secure FTD device

A.

Implement the Propagate Link Stale option on the Secure FTD device

Answers
B.

Establish a routing protocol between R1 and R2.

B.

Establish a routing protocol between R1 and R2.

Answers
C.

Disable hardware bypass on the Secure FTD device.

C.

Disable hardware bypass on the Secure FTD device.

Answers
D.

Implement autostate functionality on the Gi0/2 interface of R2

D.

Implement autostate functionality on the Gi0/2 interface of R2

Answers
Suggested answer: A

Explanation:

To ensure that router R2 removes the directly connected route for 192.168.1.0/24 from its routing table when the cable between router R1 and the Secure FTD device is disconnected, the network engineer must implement the 'Propagate Link State' option on the Secure FTD device. This option allows the FTD to propagate the link state changes to adjacent devices, ensuring that the disconnection is recognized and the routing table is updated accordingly.

Steps:

Access the FTD device configuration via FMC.

Navigate to the interface settings for the relevant interfaces.

Enable the 'Propagate Link State' option for the interfaces connected to R1 and R2.

Deploy the changes to the FTD device.

This configuration ensures that the link state changes are communicated to router R2, prompting it to remove the disconnected route from its routing table.

Which component is needed to perform rapid threat containment with Cisco FMC?

A.

ISE

A.

ISE

Answers
B.

RESTful API

B.

RESTful API

Answers
C.

SIEM

C.

SIEM

Answers
D.

DDI

D.

DDI

Answers
Suggested answer: A

Explanation:

To perform rapid threat containment with Cisco FMC, the necessary component is Cisco Identity Services Engine (ISE). ISE integrates with FMC to provide dynamic network access control and enforcement, allowing for quick isolation of compromised endpoints based on security events detected by FMC.

Steps:

Integrate FMC with ISE by configuring the necessary settings in both platforms.

Define security policies in FMC that trigger rapid threat containment actions via ISE.

When a threat is detected, FMC can instruct ISE to isolate the affected endpoint, limiting its access to the network.

This integration enables automated and efficient threat containment, reducing the response time and mitigating the impact of security incidents.

A network administrator is deploying a new Cisco Secure Firewall Threat Defense (FTD) firewall After Cisco Secure FTD is deployed, inside clients nave intermittent connectivity to each other. When ... the packet capture on the Secure FTD firewall, the administrator sees that Secure FID is responding to all the AW requests on the inside network. Which action must the network administrator e to resolve the issue''

A.

Review NAT policy and disable incorrect proxy ARP configuration.

A.

Review NAT policy and disable incorrect proxy ARP configuration.

Answers
B.

Hardcode the MAC address of the FTD to IP mapping on client machines.

B.

Hardcode the MAC address of the FTD to IP mapping on client machines.

Answers
C.

Review the access policy and verify that ARP is allowed from inside to inside.

C.

Review the access policy and verify that ARP is allowed from inside to inside.

Answers
D.

Convert the FTD to transparent mode to allow ARP requests.

D.

Convert the FTD to transparent mode to allow ARP requests.

Answers
Suggested answer: A

Explanation:

If inside clients have intermittent connectivity issues and the Cisco Secure FTD is responding to all ARP requests on the inside network, it indicates that there may be an incorrect proxy ARP configuration in the NAT policy. Proxy ARP can cause the FTD to respond to ARP requests on behalf of other devices, leading to connectivity issues.

Steps to resolve:

Review the NAT policy on the FTD to identify any incorrect proxy ARP configurations.

Disable the proxy ARP setting for the relevant NAT rules that are causing the issue.

This ensures that the FTD only responds to ARP requests as needed, preventing it from interfering with normal ARP traffic on the inside network.

An organization created a custom application that is being flagged by Cisco Secure Endpoint. The application must be exempt from being flagged. What is the process to meet the requirement?

A.

Modify the custom detection list to exclude me custom application.

A.

Modify the custom detection list to exclude me custom application.

Answers
B.

Preculculate the hash value of the custom application and add it to the allowed applications.

B.

Preculculate the hash value of the custom application and add it to the allowed applications.

Answers
C.

Configure the custom application to use the information-store paths.

C.

Configure the custom application to use the information-store paths.

Answers
D.

Add the custom application to the DFC 1st and update the policy.

D.

Add the custom application to the DFC 1st and update the policy.

Answers
Suggested answer: B

Explanation:

To exempt a custom application from being flagged by Cisco Secure Endpoint, the organization must precalculate the hash value of the custom application and add it to the allowed applications list. This process involves creating a hash of the executable file, which uniquely identifies it, and then configuring Cisco Secure Endpoint to recognize this hash as trusted.

Steps:

Calculate the hash value (e.g., SHA-256) of the custom application executable.

In the Cisco Secure Endpoint management console, navigate to the policy configuration.

Add the calculated hash value to the list of allowed applications or exclusions.

Save and deploy the updated policy.

By adding the hash value to the allowed applications, Cisco Secure Endpoint will recognize the custom application as trusted and will no longer flag it.

What is the result when two users modify a VPN policy at the same lime on a Cisco Secure Firewall Management Center managed device?

A.

Both users can edit the policy arid the last saved configuration persists.

A.

Both users can edit the policy arid the last saved configuration persists.

Answers
B.

The first user locks the configuration when selecting edit on the policy.

B.

The first user locks the configuration when selecting edit on the policy.

Answers
C.

The changes from both users will be merged together into the policy.

C.

The changes from both users will be merged together into the policy.

Answers
D.

The system prevents modifications to the policy by multiple users.

D.

The system prevents modifications to the policy by multiple users.

Answers
Suggested answer: B

Explanation:

In Cisco Secure Firewall Management Center (FMC), when two users attempt to modify a VPN policy simultaneously, the system implements a locking mechanism to prevent conflicts. The first user who selects edit on the policy locks the configuration, preventing other users from making changes until the lock is released.

Steps:

When the first user selects edit on the VPN policy, FMC locks the policy for editing.

The lock ensures that only the first user can make changes.

Once the first user saves or cancels their changes, the lock is released.

Other users can then edit the policy.

This locking mechanism ensures that configuration conflicts are avoided and only one set of changes is applied at a time.

An engineer is configuring a Cisco Secure Firewall Threat Defense device and warns to create a new intrusion rule based on the detection of a specific pattern in the data payload for a new zero-day exploit. Which keyword type must be used to add a Line that identifies the author of the rule and the date it was created?

A.

metadata

A.

metadata

Answers
B.

content

B.

content

Answers
C.

reference

C.

reference

Answers
D.

gtp_info

D.

gtp_info

Answers
Suggested answer: A

Explanation:

When creating a new intrusion rule in a Cisco Secure Firewall Threat Defense (FTD) device, the keyword type 'metadata' must be used to add a line that identifies the author of the rule and the date it was created. The metadata keyword is used to store additional information about the rule, such as authorship and creation date.

Steps:

In FMC, navigate to Policies > Intrusion > Rules.

Create a new rule or edit an existing one.

Use the 'metadata' keyword to add information about the author and date.

Example:

metadata: created_at 2023-06-15, author 'John Doe';

By using the metadata keyword, you ensure that the rule contains relevant information for tracking its creation and authorship, which is essential for maintaining rule documentation and accountability.

Refer to the Exhibit.

A security engineer must improve security in an organization and is producing a risk mitigation strategy to present to management for approval. Which action must the security engineer take based on this Attacks Risk Report?

A.

Inspect DNS traffic

A.

Inspect DNS traffic

Answers
B.

Block NetBIOS.

B.

Block NetBIOS.

Answers
C.

Block Internal Explorer

C.

Block Internal Explorer

Answers
D.

Inspect TCP port 80 traffic

D.

Inspect TCP port 80 traffic

Answers
Suggested answer: A

Explanation:

Based on the Attacks Risk Report, DNS is associated with a high number of impact events (16). DNS traffic is critical for network operations but can also be exploited for malicious activities such as DNS tunneling, DDoS attacks, and data exfiltration. To improve security, the security engineer should focus on inspecting DNS traffic. This involves deploying DNS security solutions and monitoring DNS traffic for anomalies to detect and mitigate potential threats.

Steps:

Implement DNS security tools such as DNS filtering, DNSSEC, and DNS anomaly detection.

Configure the firewall to inspect DNS traffic for malicious activities.

Regularly analyze DNS logs to identify and respond to threats.

This action addresses a significant risk identified in the report and helps to mitigate potential attacks exploiting DNS.

An engineer is troubleshooting an intermittent connectivity issue on a Cisco Secure Firewall Threat Defense appliance and must collect 24 hours' worth of data. The engineer started a packet capture. Whenever it stops prematurely during this time period. The engineer notices that the packet capture butter size is set to the default of 32 MB Which butter S170 is the maximum that the engineer must sot to able the packet capture to run successfully?

A.

64 MB

A.

64 MB

Answers
B.

1 GB

B.

1 GB

Answers
C.

10 GB

C.

10 GB

Answers
D.

100 GB

D.

100 GB

Answers
Suggested answer: B

Explanation:

To collect 24 hours' worth of data using a packet capture on a Cisco Secure Firewall Threat Defense (FTD) appliance without prematurely stopping due to buffer size limitations, the engineer should increase the packet capture buffer size. The default buffer size is 32 MB, which is insufficient for extended captures.

Steps:

Access the packet capture configuration on the FTD device.

Increase the buffer size to 1 GB, which provides a significantly larger capacity for capturing packets over a 24-hour period.

Setting the buffer size to 1 GB should accommodate a substantial amount of traffic and prevent the capture from stopping prematurely.

A security engineer manages a firewall console and an endpoint console and finds it challenging and the consuming to review events and modify blocking of specific files in both consoles. Which action must the engineer take to streamline this process?

A.

From the Secure FMC. create a Cisco Secure Endpoint object and reference the object in the Cisco Secure Endpoint console.

A.

From the Secure FMC. create a Cisco Secure Endpoint object and reference the object in the Cisco Secure Endpoint console.

Answers
B.

From the Cisco Secure Endpoint console, Croats and copy an API key and paste into the Cisco Secure AMP tab

B.

From the Cisco Secure Endpoint console, Croats and copy an API key and paste into the Cisco Secure AMP tab

Answers
C.

initiate the integration between Secure FMC and Cisco Secure Endpoint from the Secure FMC using the AMP tab

C.

initiate the integration between Secure FMC and Cisco Secure Endpoint from the Secure FMC using the AMP tab

Answers
D.

Within the Cisco Secure Endpoint console, copy the connector GUID and paste into the Cisco Secure Firewall Management Center (FMC) AMP tab.

D.

Within the Cisco Secure Endpoint console, copy the connector GUID and paste into the Cisco Secure Firewall Management Center (FMC) AMP tab.

Answers
Suggested answer: C

Explanation:

To streamline the process of reviewing events and modifying blocking of specific files across both the firewall console and the endpoint console, the security engineer should initiate the integration between Secure FMC and Cisco Secure Endpoint (formerly AMP for Endpoints) from the Secure FMC using the AMP tab.

Steps:

In the FMC, navigate to Devices > Device Management.

Select the device and go to the AMP tab.

Initiate the integration by configuring the necessary API credentials and linking the FMC to the Cisco Secure Endpoint console.

This integration allows the security engineer to view endpoint events and apply blocking actions directly from the FMC, consolidating the management tasks.

This approach simplifies the workflow by providing a single interface to manage both network and endpoint security, reducing the time and effort required to maintain security across the organization.

Total 326 questions
Go to page: of 33