ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











A network administrator reviews the file report for the last month and notices that all file types, except exe. show a disposition of unknown. What is the cause of this issue?

A.

The malware license has not been applied to the Cisco FTD.

A.

The malware license has not been applied to the Cisco FTD.

Answers
B.

The Cisco FMC cannot reach the Internet to analyze files.

B.

The Cisco FMC cannot reach the Internet to analyze files.

Answers
C.

A file policy has not been applied to the access policy.

C.

A file policy has not been applied to the access policy.

Answers
D.

Only Spero file analysis is enabled.

D.

Only Spero file analysis is enabled.

Answers
Suggested answer: C

Explanation:

A file policy defines the actions that the Cisco Firepower Threat Defense (FTD) device should take whenit encounters different types of files. The file policy is applied as part of an access control policy. If anaccess control policy does not include a file policy, the FTD device will not take any action on the files itencounters, resulting in a disposition of 'unknown' for all file types except exe

What is the benefit of selecting the trace option for packet capture?

A.

The option indicates whether the packet was dropped or successful.

A.

The option indicates whether the packet was dropped or successful.

Answers
B.

The option indicated whether the destination host responds through a different path.

B.

The option indicated whether the destination host responds through a different path.

Answers
C.

The option limits the number of packets that are captured.

C.

The option limits the number of packets that are captured.

Answers
D.

The option captures details of each packet.

D.

The option captures details of each packet.

Answers
Suggested answer: A

After deploying a network-monitoring tool to manage and monitor networking devices in your organization, you realize that you need to manually upload an MIB for the Cisco FMC. In which folder should you upload the MIB file?

A.

/etc/sf/DCMIB.ALERT

A.

/etc/sf/DCMIB.ALERT

Answers
B.

/sf/etc/DCEALERT.MIB

B.

/sf/etc/DCEALERT.MIB

Answers
C.

/etc/sf/DCEALERT.MIB

C.

/etc/sf/DCEALERT.MIB

Answers
D.

system/etc/DCEALERT.MIB

D.

system/etc/DCEALERT.MIB

Answers
Suggested answer: C

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-userguide/asa- firepower-module-user-guide-v541/Intrusion-External-Responses.pdf

Which command is run at the CLI when logged in to an FTD unit, to determine whether the unit is managed locally or by a remote FMC server?

A.

system generate-troubleshoot

A.

system generate-troubleshoot

Answers
B.

show configuration session

B.

show configuration session

Answers
C.

show managers

C.

show managers

Answers
D.

show running-config | include manager

D.

show running-config | include manager

Answers
Suggested answer: C

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/c_3.html

Which command should be used on the Cisco FTD CLI to capture all the packets that hit an interface?

A.

configure coredump packet-engine enable

A.

configure coredump packet-engine enable

Answers
B.

capture-traffic

B.

capture-traffic

Answers
C.

capture

C.

capture

Answers
D.

capture WORD

D.

capture WORD

Answers
Suggested answer: C

Explanation:

Reason: the command "capture-traffic" is used for SNORT Engine Captures. To capture a LINA Engine Capture, you use the "capture" command. Since the Lina Engine represents the actual physical interface of the device, "capture" is the only reasonable choice Reference:

https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-working-withfirepower-threat-defense-f.html#anc10The command isfirepower# capture DMZ interface dmz trace detail match ip host 192.168.76.14 host 192.168.76.100firepower# capture INSIDE interface inside trace detail match ip host 192.168.76.14 host192.168.75.14

How many report templates does the Cisco Firepower Management Center support?

A.

20

A.

20

Answers
B.

10

B.

10

Answers
C.

5

C.

5

Answers
D.

unlimited

D.

unlimited

Answers
Suggested answer: D

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Working_with_Reports.html

Which action should be taken after editing an object that is used inside an access control policy?

A.

Delete the existing object in use.

A.

Delete the existing object in use.

Answers
B.

Refresh the Cisco FMC GUI for the access control policy.

B.

Refresh the Cisco FMC GUI for the access control policy.

Answers
C.

Redeploy the updated configuration.

C.

Redeploy the updated configuration.

Answers
D.

Create another rule using a different object name.

D.

Create another rule using a different object name.

Answers
Suggested answer: C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-configguide-v63/reusable_objects.html

Which Cisco Firepower feature is used to reduce the number of events received in a period of time?

A.

rate-limiting

A.

rate-limiting

Answers
B.

suspending

B.

suspending

Answers
C.

correlation

C.

correlation

Answers
D.

thresholding

D.

thresholding

Answers
Suggested answer: D

Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-userguide/asa- firepower-module-user-guide-v541/Intrusion-Global-Threshold.html

Which report template field format is available in Cisco FMC?

A.

box lever chart

A.

box lever chart

Answers
B.

arrow chart

B.

arrow chart

Answers
C.

bar chart

C.

bar chart

Answers
D.

benchmark chart

D.

benchmark chart

Answers
Suggested answer: C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Working_with_Reports.html

Which group within Cisco does the Threat Response team use for threat analysis and research?

A.

Cisco Deep Analytics

A.

Cisco Deep Analytics

Answers
B.

OpenDNS Group

B.

OpenDNS Group

Answers
C.

Cisco Network Response

C.

Cisco Network Response

Answers
D.

Cisco Talos

D.

Cisco Talos

Answers
Suggested answer: D

Explanation:

Reference: https://www.cisco.com/c/en/us/products/security/threat-response.html#~benefits

Total 326 questions
Go to page: of 33