ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions











Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)

A.

The BVI IP address must be in a separate subnet from the connected network.

A.

The BVI IP address must be in a separate subnet from the connected network.

Answers
B.

Bridge groups are supported in both transparent and routed firewall modes.

B.

Bridge groups are supported in both transparent and routed firewall modes.

Answers
C.

Bridge groups are supported only in transparent firewall mode.

C.

Bridge groups are supported only in transparent firewall mode.

Answers
D.

Bidirectional Forwarding Detection echo packets are allowed through the FTD when using bridgegroup members.

D.

Bidirectional Forwarding Detection echo packets are allowed through the FTD when using bridgegroup members.

Answers
E.

Each directly connected network must be on the same subnet.

E.

Each directly connected network must be on the same subnet.

Answers
Suggested answer: B, E

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-configguide-v62/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html

Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?

A.

configure manager local 10.0.0.10 Cisco123

A.

configure manager local 10.0.0.10 Cisco123

Answers
B.

configure manager add Cisco123 10.0.0.10

B.

configure manager add Cisco123 10.0.0.10

Answers
C.

configure manager local Cisco123 10.0.0.10

C.

configure manager local Cisco123 10.0.0.10

Answers
D.

configure manager add 10.0.0.10 Cisco123

D.

configure manager add 10.0.0.10 Cisco123

Answers
Suggested answer: D

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/misc/fmc-ftd-mgmt-nw/fmcftd-mgmt- nw.html#id_106101

Which two actions can be used in an access control policy rule? (Choose two.)

A.

Block with Reset

A.

Block with Reset

Answers
B.

Monitor

B.

Monitor

Answers
C.

Analyze

C.

Analyze

Answers
D.

Discover

D.

Discover

Answers
E.

Block ALL

E.

Block ALL

Answers
Suggested answer: A, B

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-userguide/asa- firepower-module-user-guide-v541/AC-Rules-Tuning-Overview.html#71854

Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)

A.

BGPv6

A.

BGPv6

Answers
B.

ECMP with up to three equal cost paths across multiple interfaces

B.

ECMP with up to three equal cost paths across multiple interfaces

Answers
C.

ECMP with up to three equal cost paths across a single interface

C.

ECMP with up to three equal cost paths across a single interface

Answers
D.

BGPv4 in transparent firewall mode

D.

BGPv4 in transparent firewall mode

Answers
E.

BGPv4 with nonstop forwarding

E.

BGPv4 with nonstop forwarding

Answers
Suggested answer: A, C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-configguide-v601/fpmc-config-guide-v60_chapter_01100011.html#ID-2101-0000000e

Which object type supports object overrides?

A.

time range

A.

time range

Answers
B.

security group tag

B.

security group tag

Answers
C.

network object

C.

network object

Answers
D.

DNS server group

D.

DNS server group

Answers
Suggested answer: C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Reusable_Objects.html#concept_8BFE8B9A83D742D9B647A74F7AD50053

Which Cisco Firepower rule action displays an HTTP warning page?

A.

Monitor

A.

Monitor

Answers
B.

Block

B.

Block

Answers
C.

Interactive Block

C.

Interactive Block

Answers
D.

Allow with Warning

D.

Allow with Warning

Answers
Suggested answer: C

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHTSystem-UserGuide-v5401/AC-Rules-Tuning-Overview.html#76698

What is the result of specifying of QoS rule that has a rate limit that is greater than the maximum throughput of an interface?

A.

The rate-limiting rule is disabled.

A.

The rate-limiting rule is disabled.

Answers
B.

Matching traffic is not rate limited.

B.

Matching traffic is not rate limited.

Answers
C.

The system rate-limits all traffic.

C.

The system rate-limits all traffic.

Answers
D.

The system repeatedly generates warnings.

D.

The system repeatedly generates warnings.

Answers
Suggested answer: B

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-configguide-v62/quality_of_service_qos.pdf

Which Firepower feature allows users to configure bridges in routed mode and enables devices to perform Layer 2 switching between interfaces?

A.

FlexConfig

A.

FlexConfig

Answers
B.

BDI

B.

BDI

Answers
C.

SGT

C.

SGT

Answers
D.

IRB

D.

IRB

Answers
Suggested answer: D

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/relnotes/Firepower_System_Release_Notes_Version_620/new_features_and_functionality.html

In which two places can thresholding settings be configured? (Choose two.)

A.

on each IPS rule

A.

on each IPS rule

Answers
B.

globally, within the network analysis policy

B.

globally, within the network analysis policy

Answers
C.

globally, per intrusion policy

C.

globally, per intrusion policy

Answers
D.

on each access control rule

D.

on each access control rule

Answers
E.

per preprocessor, within the network analysis policy

E.

per preprocessor, within the network analysis policy

Answers
Suggested answer: A, C

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-userguide/asa- firepower-module-user-guide-v541/Intrusion-Global-Threshold.pdf

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

A.

Traffic inspection can be interrupted temporarily when configuration changes are deployed.

A.

Traffic inspection can be interrupted temporarily when configuration changes are deployed.

Answers
B.

The system performs intrusion inspection followed by file inspection.

B.

The system performs intrusion inspection followed by file inspection.

Answers
C.

They can block traffic based on Security Intelligence data.

C.

They can block traffic based on Security Intelligence data.

Answers
D.

File policies use an associated variable set to perform intrusion prevention.

D.

File policies use an associated variable set to perform intrusion prevention.

Answers
E.

The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.

E.

The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.

Answers
Suggested answer: A, C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Access_Control_Using_Intrusion_and_File_Policies.html

Total 326 questions
Go to page: of 33