Cisco 300-710 Practice Test - Questions Answers, Page 8
List of questions
Related questions
A network engineer is configuring URL Filtering on Firepower Threat Defense. Which two port requirements on the Firepower Management Center must be validated to allow communication with the cloud service? (Choose two.)
outbound port TCP/443
inbound port TCP/80
outbound port TCP/8080
inbound port TCP/443
outbound port TCP/80
What is the maximum bit size that Cisco FMC supports for HTTPS certificates?
1024
8192
4096
2048
Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?
Child domains can view but not edit dashboards that originate from an ancestor domain.
Child domains have access to only a limited set of widgets from ancestor domains.
Only the administrator of the top ancestor domain can view dashboards.
Child domains cannot view dashboards that originate from an ancestor domain.
Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)
An option to re-apply NAT and VPN policies during registration is available, so users do not need to re- apply the policies after registration is completed.
Before re-adding the device in Cisco FMC, you must add the manager back in the device.
No option to delete and re-add a device is available in the Cisco FMC web interface.
The Cisco FMC web interface prompts users to re-apply access control policies.
No option to re-apply NAT and VPN policies during registration is available, so users need to reapply the policies after registration is completed.
What is a behavior of a Cisco FMC database purge?
User login and history data are removed from the database if the User Activity check box is selected.
Data can be recovered from the device.
The appropriate process is restarted.
The specified data is removed from Cisco FMC and kept for two weeks.
Which two packet captures does the FTD LINA engine support? (Choose two.)
Layer 7 network ID
source IP
application ID
dynamic firewall importing
protocol
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)
application blocking
simple custom detection
file repository
exclusions
application whitelisting
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?
Add the malicious file to the block list.
Send a snapshot to Cisco for technical support.
Forward the result of the investigation to an external threat-analysis engine.
Wait for Cisco Threat Response to automatically block the malware.
Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?
Windows domain controller
audit
triage
protection
What is a valid Cisco AMP file disposition?
non-malicious
malware
known-good
pristine
Question