ExamGecko
Home Home / Cisco / 300-710

Cisco 300-710 Practice Test - Questions Answers, Page 8

Question list
Search
Search

Related questions











A network engineer is configuring URL Filtering on Firepower Threat Defense. Which two port requirements on the Firepower Management Center must be validated to allow communication with the cloud service? (Choose two.)

A.

outbound port TCP/443

A.

outbound port TCP/443

Answers
B.

inbound port TCP/80

B.

inbound port TCP/80

Answers
C.

outbound port TCP/8080

C.

outbound port TCP/8080

Answers
D.

inbound port TCP/443

D.

inbound port TCP/443

Answers
E.

outbound port TCP/80

E.

outbound port TCP/80

Answers
Suggested answer: A, E

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/SecurityInternet_Accessand_Communication_Ports.html

What is the maximum bit size that Cisco FMC supports for HTTPS certificates?

A.

1024

A.

1024

Answers
B.

8192

B.

8192

Answers
C.

4096

C.

4096

Answers
D.

2048

D.

2048

Answers
Suggested answer: C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-configguide-v61/system_configuration.html

Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?

A.

Child domains can view but not edit dashboards that originate from an ancestor domain.

A.

Child domains can view but not edit dashboards that originate from an ancestor domain.

Answers
B.

Child domains have access to only a limited set of widgets from ancestor domains.

B.

Child domains have access to only a limited set of widgets from ancestor domains.

Answers
C.

Only the administrator of the top ancestor domain can view dashboards.

C.

Only the administrator of the top ancestor domain can view dashboards.

Answers
D.

Child domains cannot view dashboards that originate from an ancestor domain.

D.

Child domains cannot view dashboards that originate from an ancestor domain.

Answers
Suggested answer: D

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Using_Dashboards.html

Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)

A.

An option to re-apply NAT and VPN policies during registration is available, so users do not need to re- apply the policies after registration is completed.

A.

An option to re-apply NAT and VPN policies during registration is available, so users do not need to re- apply the policies after registration is completed.

Answers
B.

Before re-adding the device in Cisco FMC, you must add the manager back in the device.

B.

Before re-adding the device in Cisco FMC, you must add the manager back in the device.

Answers
C.

No option to delete and re-add a device is available in the Cisco FMC web interface.

C.

No option to delete and re-add a device is available in the Cisco FMC web interface.

Answers
D.

The Cisco FMC web interface prompts users to re-apply access control policies.

D.

The Cisco FMC web interface prompts users to re-apply access control policies.

Answers
E.

No option to re-apply NAT and VPN policies during registration is available, so users need to reapply the policies after registration is completed.

E.

No option to re-apply NAT and VPN policies during registration is available, so users need to reapply the policies after registration is completed.

Answers
Suggested answer: D, E

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Device_Management_Basics.html

What is a behavior of a Cisco FMC database purge?

A.

User login and history data are removed from the database if the User Activity check box is selected.

A.

User login and history data are removed from the database if the User Activity check box is selected.

Answers
B.

Data can be recovered from the device.

B.

Data can be recovered from the device.

Answers
C.

The appropriate process is restarted.

C.

The appropriate process is restarted.

Answers
D.

The specified data is removed from Cisco FMC and kept for two weeks.

D.

The specified data is removed from Cisco FMC and kept for two weeks.

Answers
Suggested answer: C

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-configguide-v62/management_center_database_purge.pdf

Which two packet captures does the FTD LINA engine support? (Choose two.)

A.

Layer 7 network ID

A.

Layer 7 network ID

Answers
B.

source IP

B.

source IP

Answers
C.

application ID

C.

application ID

Answers
D.

dynamic firewall importing

D.

dynamic firewall importing

Answers
E.

protocol

E.

protocol

Answers
Suggested answer: B, E

Explanation:

Reference: https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-workingwith-firepower-threat-defense-f.html

Topic 4, Integration

Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)

A.

application blocking

A.

application blocking

Answers
B.

simple custom detection

B.

simple custom detection

Answers
C.

file repository

C.

file repository

Answers
D.

exclusions

D.

exclusions

Answers
E.

application whitelisting

E.

application whitelisting

Answers
Suggested answer: A, B

Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?

A.

Add the malicious file to the block list.

A.

Add the malicious file to the block list.

Answers
B.

Send a snapshot to Cisco for technical support.

B.

Send a snapshot to Cisco for technical support.

Answers
C.

Forward the result of the investigation to an external threat-analysis engine.

C.

Forward the result of the investigation to an external threat-analysis engine.

Answers
D.

Wait for Cisco Threat Response to automatically block the malware.

D.

Wait for Cisco Threat Response to automatically block the malware.

Answers
Suggested answer: A

Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?

A.

Windows domain controller

A.

Windows domain controller

Answers
B.

audit

B.

audit

Answers
C.

triage

C.

triage

Answers
D.

protection

D.

protection

Answers
Suggested answer: B

Explanation:

Reference: https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/214933-amp-forendpoints-deployment-methodology.html

What is a valid Cisco AMP file disposition?

A.

non-malicious

A.

non-malicious

Answers
B.

malware

B.

malware

Answers
C.

known-good

C.

known-good

Answers
D.

pristine

D.

pristine

Answers
Suggested answer: B

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configQuestions& Answers PDF P-33guide- v60/Reference_a_wrapper_Chapter_topic_here.html

Total 326 questions
Go to page: of 33