Cisco 300-710 Practice Test - Questions Answers, Page 4
List of questions
Related questions
Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)
The BVI IP address must be in a separate subnet from the connected network.
Bridge groups are supported in both transparent and routed firewall modes.
Bridge groups are supported only in transparent firewall mode.
Bidirectional Forwarding Detection echo packets are allowed through the FTD when using bridgegroup members.
Each directly connected network must be on the same subnet.
Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?
configure manager local 10.0.0.10 Cisco123
configure manager add Cisco123 10.0.0.10
configure manager local Cisco123 10.0.0.10
configure manager add 10.0.0.10 Cisco123
Which two actions can be used in an access control policy rule? (Choose two.)
Block with Reset
Monitor
Analyze
Discover
Block ALL
Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)
BGPv6
ECMP with up to three equal cost paths across multiple interfaces
ECMP with up to three equal cost paths across a single interface
BGPv4 in transparent firewall mode
BGPv4 with nonstop forwarding
Which object type supports object overrides?
time range
security group tag
network object
DNS server group
Which Cisco Firepower rule action displays an HTTP warning page?
Monitor
Block
Interactive Block
Allow with Warning
What is the result of specifying of QoS rule that has a rate limit that is greater than the maximum throughput of an interface?
The rate-limiting rule is disabled.
Matching traffic is not rate limited.
The system rate-limits all traffic.
The system repeatedly generates warnings.
Which Firepower feature allows users to configure bridges in routed mode and enables devices to perform Layer 2 switching between interfaces?
FlexConfig
BDI
SGT
IRB
In which two places can thresholding settings be configured? (Choose two.)
on each IPS rule
globally, within the network analysis policy
globally, per intrusion policy
on each access control rule
per preprocessor, within the network analysis policy
In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)
Traffic inspection can be interrupted temporarily when configuration changes are deployed.
The system performs intrusion inspection followed by file inspection.
They can block traffic based on Security Intelligence data.
File policies use an associated variable set to perform intrusion prevention.
The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.
Question