ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 33

Question list
Search
Search

Related questions











A software development company hosts the website http:dev.company.com for contractors to share code for projects they are working on with internal developers. The web server is on premises and is protected by a Cisco Secure Firewall Threat Defense appliance. The network administrator is worried about someone trying to transmit infected files to internal users via this site. Which type of policy must be able associated with an access control policy to enable Cisco Secure Firewall Malware Defense to detect and block malware?

A.

SSL policy

A.

SSL policy

Answers
B.

Prefilter policy

B.

Prefilter policy

Answers
C.

File policy

C.

File policy

Answers
D.

Network discovery policy

D.

Network discovery policy

Answers
Suggested answer: C

Explanation:

To enable Cisco Secure Firewall Malware Defense to detect and block malware, the network administrator must associate a File policy with an access control policy. File policies allow administrators to configure malware detection and file analysis capabilities on the Cisco Secure Firewall Threat Defense appliance.

Steps to configure File policy:

Navigate to Policies > Access Control > File Policies in the FMC.

Create a new file policy or edit an existing one to include malware detection and blocking settings.

Associate the file policy with the relevant access control policy.

Ensure that the access control policy is deployed to the FTD appliance.

By associating a file policy, the firewall will inspect files being transmitted through the web server for malware and take appropriate actions (block, allow, or alert) based on the configured rules.

A network engineer must configure an existing firewall to have a NAT configuration. The now configuration must support more than two interlaces per context. The firewall has previously boon operating transparent mode. The Cisco Secure Firewall Throat Defense (FTD) device has been deregistered from Cisco Secure Firewall Management Center (FMC). Which set of configuration actions must the network engineer take next to meet the requirements?

A.

Run the configure manager add routed command from the Secure FTD device CL1, and reregister with Secure FMC.

A.

Run the configure manager add routed command from the Secure FTD device CL1, and reregister with Secure FMC.

Answers
B.

Run the configure firewall routed command from the Secure FTD device CD, and reregister with Secure FMC.

B.

Run the configure firewall routed command from the Secure FTD device CD, and reregister with Secure FMC.

Answers
C.

Run the configure manager add routed command from the Secure FMC CLI. and reregister with Secure FMC.

C.

Run the configure manager add routed command from the Secure FMC CLI. and reregister with Secure FMC.

Answers
D.

Run the configure firewall routed command from the Secure FMC CLI. and reregister with Secure FMC.

D.

Run the configure firewall routed command from the Secure FMC CLI. and reregister with Secure FMC.

Answers
Suggested answer: B

Explanation:

To support more than two interfaces per context and enable NAT configurations, the firewall must operate in routed mode. Since the firewall was previously in transparent mode, the network engineer needs to change it to routed mode.

Steps:

Access the CLI of the Secure FTD device.

Run the command configure firewall routed to switch the firewall from transparent mode to routed mode.

Reregister the FTD device with the FMC by running the configure manager add <FMC_IP> <Registration_Key> command from the FTD device CLI.

This will ensure that the firewall can support the required NAT configurations and more than two interfaces per context.

Which file format can standard reports from Cisco Secure Firewall Management Center be downloaded in?

A.

ppt

A.

ppt

Answers
B.

csv

B.

csv

Answers
C.

xis

C.

xis

Answers
D.

doc

D.

doc

Answers
Suggested answer: B

Explanation:

Standard reports from Cisco Secure Firewall Management Center can be downloaded in CSV (Comma-Separated Values) format. This format is widely used for data exchange and can be opened in various applications such as Microsoft Excel.

Steps to download reports:

Navigate to Reports > Report Designer in the FMC.

Select or create the report you wish to download.

Choose the CSV format option when exporting the report.

This allows the network engineer to analyze and manipulate the report data easily.

An engineer has been tasked with performing an audit of network projects to determine which objects are duplicated across the various firewall models (Cisco Secure Firewall Threat Defense Cisco Secure firewall ASA, and Meraki MX Series) deployed throughout the company Which tool will assist the engineer in performing that audit?

A.

Cisco Firepower Device Manager

A.

Cisco Firepower Device Manager

Answers
B.

Cisco SecureX

B.

Cisco SecureX

Answers
C.

Cisco Defense Orchestrator

C.

Cisco Defense Orchestrator

Answers
D.

Cisco Secure Firewall Management Center

D.

Cisco Secure Firewall Management Center

Answers
Suggested answer: C

Explanation:

Cisco Defense Orchestrator (CDO) is the tool that assists engineers in performing an audit of network projects to determine which objects are duplicated across various firewall models, including Cisco Secure Firewall Threat Defense, Cisco Secure Firewall ASA, and Meraki MX Series. CDO provides a unified management interface for managing multiple security devices and can identify duplicate objects across these devices.

Steps:

Access Cisco Defense Orchestrator.

Connect and synchronize all relevant firewall devices (FTD, ASA, Meraki MX).

Use the audit and reporting features in CDO to identify and manage duplicate objects.

This helps ensure consistency and efficient management across the organization's firewall deployments.

A security engineer must create a malware and file policy on a Cisco Secure Firewall Threat Defense device. The solution must ensure that PDF. DOCX, and XLSX files are not sent lo Cisco Secure Malware analytics. What must do configured to meet the requirements''

A.

capacity handling

A.

capacity handling

Answers
B.

Spero analysis

B.

Spero analysis

Answers
C.

dynamic analysis

C.

dynamic analysis

Answers
D.

local malware analysis

D.

local malware analysis

Answers
Suggested answer: D

Explanation:

To create a malware and file policy on a Cisco Secure Firewall Threat Defense (FTD) device that ensures PDF, DOCX, and XLSX files are not sent to Cisco Secure Malware Analytics, the security engineer must configure local malware analysis. Local malware analysis allows the FTD to inspect and analyze files locally without sending them to the cloud-based Cisco Secure Malware Analytics.

Steps to configure local malware analysis:

In FMC, navigate to Policies > Access Control > Malware & File Policies.

Create a new malware and file policy or edit an existing one.

Define rules to inspect specific file types, ensuring that PDF, DOCX, and XLSX files are handled locally.

Set the action for these file types to 'Local Analysis.'

Apply the policy to the relevant access control policy.

This configuration ensures that the specified file types are analyzed locally, meeting the requirement to avoid sending them to Cisco Secure Malware Analytics.

An engineer must integrate a thud-party security Intelligence teed with Cisco Secure Firewall Management Center. Secure Firewall Management Center is running Version 6.2 3 and has 8 GB of memory. Which two actions must be taken to implement Throat Intelligence Director? (Choose two.)

A.

Upgrade to version 6.6.

A.

Upgrade to version 6.6.

Answers
B.

Enable REST API access.

B.

Enable REST API access.

Answers
C.

Add the URL of the TAXII server.

C.

Add the URL of the TAXII server.

Answers
D.

Add 7 GB of memory.

D.

Add 7 GB of memory.

Answers
E.

Add a TAXII server

E.

Add a TAXII server

Answers
Suggested answer: A, C

Explanation:

To integrate a third-party security intelligence feed with Cisco Secure Firewall Management Center (FMC) using Threat Intelligence Director (TID), the following actions are necessary:

Upgrade to version 6.6: The FMC must be running at least version 6.6 to support Threat Intelligence Director. Version 6.2.3 does not support the necessary features for this integration.

Add the URL of the TAXII server: Threat Intelligence Director uses TAXII (Trusted Automated eXchange of Indicator Information) to pull threat intelligence data from third-party sources. The URL of the TAXII server must be added to the TID configuration in FMC.

Steps:

Upgrade FMC to version 6.6 or later.

In FMC, navigate to Integration > Threat Intelligence Director.

Add a new TAXII server by entering the URL of the TAXII server.

These actions enable the integration of third-party threat intelligence feeds, enhancing the security capabilities of the FMC.

Total 326 questions
Go to page: of 33