ExamGecko
Home / Cisco / 300-710 / List of questions
Ask Question

Cisco 300-710 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)

The BVI IP address must be in a separate subnet from the connected network.

The BVI IP address must be in a separate subnet from the connected network.

Bridge groups are supported in both transparent and routed firewall modes.

Bridge groups are supported in both transparent and routed firewall modes.

Bridge groups are supported only in transparent firewall mode.

Bridge groups are supported only in transparent firewall mode.

Bidirectional Forwarding Detection echo packets are allowed through the FTD when using bridgegroup members.

Bidirectional Forwarding Detection echo packets are allowed through the FTD when using bridgegroup members.

Each directly connected network must be on the same subnet.

Each directly connected network must be on the same subnet.

Suggested answer: B, E
Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-configguide-v62/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html

asked 07/10/2024
Daniel Calleja
38 questions

Question 32

Report Export Collapse

Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?

configure manager local 10.0.0.10 Cisco123

configure manager local 10.0.0.10 Cisco123

configure manager add Cisco123 10.0.0.10

configure manager add Cisco123 10.0.0.10

configure manager local Cisco123 10.0.0.10

configure manager local Cisco123 10.0.0.10

configure manager add 10.0.0.10 Cisco123

configure manager add 10.0.0.10 Cisco123

Suggested answer: D
Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/misc/fmc-ftd-mgmt-nw/fmcftd-mgmt- nw.html#id_106101

asked 07/10/2024
Kevin Lizano
38 questions

Question 33

Report Export Collapse

Which two actions can be used in an access control policy rule? (Choose two.)

Block with Reset

Block with Reset

Monitor

Monitor

Analyze

Analyze

Discover

Discover

Block ALL

Block ALL

Suggested answer: A, B
Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-userguide/asa- firepower-module-user-guide-v541/AC-Rules-Tuning-Overview.html#71854

asked 07/10/2024
Yohan Frachisse
33 questions

Question 34

Report Export Collapse

Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)

BGPv6

BGPv6

ECMP with up to three equal cost paths across multiple interfaces

ECMP with up to three equal cost paths across multiple interfaces

ECMP with up to three equal cost paths across a single interface

ECMP with up to three equal cost paths across a single interface

BGPv4 in transparent firewall mode

BGPv4 in transparent firewall mode

BGPv4 with nonstop forwarding

BGPv4 with nonstop forwarding

Suggested answer: A, C
Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-configguide-v601/fpmc-config-guide-v60_chapter_01100011.html#ID-2101-0000000e

asked 07/10/2024
ESSIS MAXIME-ALPHONSE SELLY
35 questions

Question 35

Report Export Collapse

Which object type supports object overrides?

time range

time range

security group tag

security group tag

network object

network object

DNS server group

DNS server group

Suggested answer: C
Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Reusable_Objects.html#concept_8BFE8B9A83D742D9B647A74F7AD50053

asked 07/10/2024
Zied Nassr
40 questions

Question 36

Report Export Collapse

Which Cisco Firepower rule action displays an HTTP warning page?

Monitor

Monitor

Block

Block

Interactive Block

Interactive Block

Allow with Warning

Allow with Warning

Suggested answer: C
Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHTSystem-UserGuide-v5401/AC-Rules-Tuning-Overview.html#76698

asked 07/10/2024
Robert Petty
57 questions

Question 37

Report Export Collapse

What is the result of specifying of QoS rule that has a rate limit that is greater than the maximum throughput of an interface?

The rate-limiting rule is disabled.

The rate-limiting rule is disabled.

Matching traffic is not rate limited.

Matching traffic is not rate limited.

The system rate-limits all traffic.

The system rate-limits all traffic.

The system repeatedly generates warnings.

The system repeatedly generates warnings.

Suggested answer: B
Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-configguide-v62/quality_of_service_qos.pdf

asked 07/10/2024
Swen Evers
41 questions

Question 38

Report Export Collapse

Which Firepower feature allows users to configure bridges in routed mode and enables devices to perform Layer 2 switching between interfaces?

FlexConfig

FlexConfig

BDI

BDI

SGT

SGT

IRB

IRB

Suggested answer: D
Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/relnotes/Firepower_System_Release_Notes_Version_620/new_features_and_functionality.html

asked 07/10/2024
Victor Platonov
43 questions

Question 39

Report Export Collapse

In which two places can thresholding settings be configured? (Choose two.)

on each IPS rule

on each IPS rule

globally, within the network analysis policy

globally, within the network analysis policy

globally, per intrusion policy

globally, per intrusion policy

on each access control rule

on each access control rule

per preprocessor, within the network analysis policy

per preprocessor, within the network analysis policy

Suggested answer: A, C
Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-userguide/asa- firepower-module-user-guide-v541/Intrusion-Global-Threshold.pdf

asked 07/10/2024
Maria Gervasi
41 questions

Question 40

Report Export Collapse

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

Traffic inspection can be interrupted temporarily when configuration changes are deployed.

Traffic inspection can be interrupted temporarily when configuration changes are deployed.

The system performs intrusion inspection followed by file inspection.

The system performs intrusion inspection followed by file inspection.

They can block traffic based on Security Intelligence data.

They can block traffic based on Security Intelligence data.

File policies use an associated variable set to perform intrusion prevention.

File policies use an associated variable set to perform intrusion prevention.

The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.

The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.

Suggested answer: A, C
Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Access_Control_Using_Intrusion_and_File_Policies.html

asked 07/10/2024
christopher patrick
34 questions
Total 326 questions
Go to page: of 33

Related questions