Big Black Friday Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

Cisco 300-710 Securing Networks with Cisco Firepower (300-710 SNCF) Exam Practice Test

Page: 1 / 39
Total 385 questions

Securing Networks with Cisco Firepower (300-710 SNCF) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $139.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36  $119.99
Question 1

Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)

Options:

A.

The BVI IP address must be in a separate subnet from the connected network.

B.

Bridge groups are supported in both transparent and routed firewall modes.

C.

Bridge groups are supported only in transparent firewall mode.

D.

Bidirectional Forwarding Detection echo packets are allowed through the FTD when using bridge-group members.

E.

Each directly connected network must be on the same subnet.

Question 2

An engineer is integrating Cisco Secure Endpoint with Cisco Secure Firewall Management Center in high availability mode. Malware events detected by Secure Endpoint must also be

received by Secure Firewall Management Center and public cloud services are used. Which two configurations must be selected on both high availability peers independently? (Choose two.)

Options:

A.

internet connection

B.

Smart Software Manager Satellite

C.

Cisco Success Network

D.

security group tag

E.

Secure Endpoint Cloud Connection

Question 3

A network administrator is configuring a site-to-site IPsec VPN to a router sitting behind a Cisco FTD. The administrator has configured an access policy to allow traffic to this device on UDP 500, 4500, and ESP VPN traffic is not working. Which action resolves this issue?

Options:

A.

Set the allow action in the access policy to trust.

B.

Enable IPsec inspection on the access policy.

C.

Modify the NAT policy to use the interface PAT.

D.

Change the access policy to allow all ports.

Question 4

A security engineer must configure a Cisco FTD appliance to inspect traffic coming from the internet. The Internet traffic will be mirrored from the Cisco Catalyst 9300 Switch. Which configuration accomplishes the task?

Options:

A.

Set interface configuration mode to none.

B.

Set the firewall mode to transparent.

C.

Set the firewall mode to routed.

D.

Set interface configuration mode to passive.

Question 5

What is the purpose of the IRB feature in next-generation firewall?

Options:

A.

To allow multiple physical interfaces to be part of the same VLAN

B.

To enable transparent bridging between two Layer 2 interfaces

C.

To block routing between two Layer 3 interfaces

D.

To configure NAT in transparent mode

Question 6

Upon detecting a flagrant threat on an endpoint, which two technologies instruct Cisco Identity Services Engine to contain the infected endpoint either manually or automatically? (Choose two.)

Options:

A.

Cisco ASA 5500 Series

B.

Cisco FMC

C.

Cisco AMP

D.

Cisco Stealthwatch

E.

Cisco ASR 7200 Series

Question 7

What is the maximum bit size that Cisco FMC supports for HTTPS certificates?

Options:

A.

1024

B.

8192

C.

4096

D.

2048

Question 8

An engineer is reviewing a ticket that requests to allow traffic for some devices that must connect to a server over 8699/udp. The request mentions only one IP address, 172.16.18.15, but the requestor asked for the engineer to open the port for all machines that have been trying to connect to it over the last week. Which action must the engineer take to troubleshoot this issue?

Options:

A.

Use the context explorer to see the application blocks by protocol.

B.

Use the context explorer to see the destination port blocks

C.

Filter the connection events by the source port 8699/udp.

D.

Filter the connection events by the destination port 8699/udp.

Question 9

An engineer must build redundancy into the network and traffic must continuously flow if a redundant switch in front of the firewall goes down. What must be configured to accomplish this task?

Options:

A.

redundant interfaces on the firewall cluster mode and switches

B.

redundant interfaces on the firewall noncluster mode and switches

C.

vPC on the switches to the interface mode on the firewall duster

D.

vPC on the switches to the span EtherChannel on the firewall cluster

Question 10

An organization is migrating their Cisco ASA devices running in multicontext mode to Cisco FTD devices. Which action must be taken to ensure that each context on the Cisco ASA is logically separated in the Cisco FTD devices?

Options:

A.

Add a native instance to distribute traffic to each Cisco FTD context.

B.

Add the Cisco FTD device to the Cisco ASA port channels.

C.

Configure a container instance in the Cisco FTD for each context in the Cisco ASA.

D.

Configure the Cisco FTD to use port channels spanning multiple networks.

Question 11

Refer to the exhibit. An engineer analyzes a Network Risk Report from Cisco Secure Firewall Management Center. What should the engineer recommend implementing to mitigate the risk?

Options:

A.

IP address and URL blacklisting

B.

Trend analysis

C.

Network-based detection

D.

Virtual protection

Question 12

A security engineer must create a malware and file policy on a Cisco Secure Firewall Threat Defense device. The solution must ensure that PDF. DOCX, and XLSX files are not sent lo Cisco Secure Malware analytics. What must do configured to meet the requirements''

Options:

A.

capacity handling

B.

Spero analysis

C.

dynamic analysis

D.

local malware analysis

Question 13

The administrator notices that there is malware present with an .exe extension and needs to verify if any of the systems on the network are running the executable file. What must be configured within Cisco AMP for Endpoints to show this data?

Options:

A.

prevalence

B.

threat root cause

C.

vulnerable software

D.

file analysis

Question 14

An administrator needs to configure Cisco FMC to send a notification email when a data transfer larger than 10 MB is initiated from an internal host outside of standard business hours. Which Cisco FMC feature must be configured to accomplish this task?

Options:

A.

file and malware policy

B.

application detector

C.

intrusion policy

D.

correlation policy

Question 15

An engineer has been tasked with performing an audit of network projects to determine which objects are duplicated across the various firewall models (Cisco Secure Firewall Threat Defense Cisco Secure firewall ASA, and Meraki MX Series) deployed throughout the company Which tool will assist the engineer in performing that audit?

Options:

A.

Cisco Firepower Device Manager

B.

Cisco SecureX

C.

Cisco Defense Orchestrator

D.

Cisco Secure Firewall Management Center

Question 16

An engineer wants to perform a packet capture on the Cisco FTD to confirm that the host using IP address 192 168.100.100 has the MAC address of 0042 7734.103 to help troubleshoot aconnectivity issue What is the correct tcpdump command syntax to ensure that the MAC address appears in the packet capture output?

Options:

A.

-nm src 192.168.100.100

B.

-ne src 192.168.100.100

C.

-w capture.pcap -s 1518 host 192.168.100.100 mac

D.

-w capture.pcap -s 1518 host 192.168.100.100 ether

Question 17

Which two actions can be used in an access control policy rule? (Choose two.)

Options:

A.

Block with Reset

B.

Monitor

C.

Analyze

D.

Discover

E.

Block ALL

Question 18

A network engineer must configure IPS mode on a Cisco Secure firewall Threat Defense device to inspect traffic and act as an IDS. The engineer already configured the passive-interface on the secure firewall threat Defence device and SPAN on the switch. What must be configured next by the engineer?

Options:

A.

intrusion policy on the Secure Firewall Threat Defense device

B.

active Interface on me Secure Firewall threat Defense device

C.

DHCP on the switch

D.

active SPAN port on the switch

Question 19

Which command-line mode is supported from the Cisco Firepower Management Center CLI?

Options:

A.

privileged

B.

user

C.

configuration

D.

admin

Question 20

Which Cisco Firepower rule action displays an HTTP warning page?

Options:

A.

Monitor

B.

Block

C.

Interactive Block

D.

Allow with Warning

Question 21

Refer to the exhibit. Users attempt to connect to numerous external resources on various TCP ports. If the users mistype the port, their connection closes immediately, and it takes more than one minute before the connection is torn down. An engineer manages to capture both types of connections as shown in the exhibit. What must the engineer configure to lower the timeout values for the second group of connections and resolve the user issues?

Options:

A.

outbound access rule that allows the entire ICMP protocol suite

B.

inbound access rule that allows ICMP Type 3 from outside

C.

inbound access rule that allows TCP reset packets from outside

D.

outbound access rule with the Block with reset action

Question 22

What is the result of specifying of QoS rule that has a rate limit that is greater than the maximum throughput of an interface?

Options:

A.

The rate-limiting rule is disabled.

B.

Matching traffic is not rate limited.

C.

The system rate-limits all traffic.

D.

The system repeatedly generates warnings.

Question 23

Which action should be taken after editing an object that is used inside an access control policy?

Options:

A.

Delete the existing object in use.

B.

Refresh the Cisco FMC GUI for the access control policy.

C.

Redeploy the updated configuration.

D.

Create another rule using a different object name.

Question 24

What is a valid Cisco AMP file disposition?

Options:

A.

non-malicious

B.

malware

C.

known-good

D.

pristine

Question 25

An engineer is attempting to add a new FTD device to their FMC behind a NAT device with a NAT ID of ACME001 and a password of Cisco388267669. Which command set must be used in order to accomplish this?

Options:

A.

configure manager add ACME001

B.

configure manager add ACME0O1

C.

configure manager add DONTRESOLVE AMCE001

D.

configure manager add registration key> ACME001

Question 26

With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?

Options:

A.

inline set

B.

passive

C.

routed

D.

inline tap

Question 27

An engineer is setting up a new Firepower deployment and is looking at the default FMC policies to start the implementation During the initial trial phase, the organization wants to test some common Snort rules while still allowing the majority of network traffic to pass Which default policy should be used?

Options:

A.

Maximum Detection

B.

Security Over Connectivity

C.

Balanced Security and Connectivity

D.

Connectivity Over Security

Question 28

Refer to the exhibit. An engineer is deploying a new instance of Cisco Secure Firewall Threat Defense. Which action must the engineer take next so that Client_A and Client_B receive an IP address via DHCP from Server_A?

Options:

A.

Disable Option 82 in the DHCP relay configuration properties using Secure Firewall Management Center.

B.

Add access rules that allow DHCP traffic by using Cisco Secure Firewall Management Center.

C.

Add another DHCP pool on Server_A with DHCP relay on Secure Firewall Threat Defense.

D.

Disable all the DHCP Snort rules by using Secure Firewall Device Manager.

Question 29

An engineer is configuring a Cisco IPS to protect the network and wants to test a policy before deploying it. A copy of each incoming packet needs to be monitored while traffic flow remains constant. Which IPS mode should be implemented to meet these requirements?

Options:

A.

Inline tap

B.

passive

C.

transparent

D.

routed

Question 30

What is the role of realms in the Cisco ISE and Cisco Secure Firewall Management Center integration?

Options:

A.

TACACS+ database

B.

AD definition

C.

Cisco Secure Firewall VDC

D.

Cisco ISE context

E.

(Option not provided – please confirm or provide)

Question 31

When a Cisco FTD device is configured in transparent firewall mode, on which two interface types can an IP address be configured? (Choose two.)

Options:

A.

Diagnostic

B.

EtherChannel

C.

BVI

D.

Physical

E.

Subinterface

Question 32

An analyst using the security analyst account permissions is trying to view the Correlations Events Widget but is not able to access it. However, other dashboards are accessible. Why is this occurring?

Options:

A.

An API restriction within the Cisco FMC is preventing the widget from displaying.

B.

The widget is configured to display only when active events are present.

C.

The widget is not configured within the Cisco FMC.

D.

The security analyst role does not have permission to view this widget.

Question 33

An organization is installing a new Cisco FTD appliance in the network. An engineer is tasked with configuring access between two network segments within the same IP subnet. Which step is needed to accomplish this task?

Options:

A.

Assign an IP address to the Bridge Virtual Interface.

B.

Permit BPDU packets to prevent loops.

C.

Specify a name for the bridge group.

D.

Add a separate bridge group for each segment.

Question 34

A network engineer must configure the cabling between a Cisco Secure Firewall Threat Defense appliance and a network so the Secure Firewall Threat Defense appliance performs inline to analyze and tune generated intrusion events before going live. Which Secure Firewall Threat Defense interface mode must the engineer use?

Options:

A.

bypass

B.

link state propagation

C.

tap mode

D.

strict TCP enforcement

Question 35

A network administrator is concerned about (he high number of malware files affecting users' machines. What must be done within the access control policy in Cisco FMC to address this concern?

Options:

A.

Create an intrusion policy and set the access control policy to block.

B.

Create an intrusion policy and set the access control policy to allow.

C.

Create a file policy and set the access control policy to allow.

D.

Create a file policy and set the access control policy to block.

Question 36

Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high- availability?

Options:

A.

configure high-availability resume

B.

configure high-availability disable

C.

system support network-options

D.

configure high-availability suspend

Question 37

Refer to the exhibit. An engineer configures a NAT rule allowing clients to use the internet only if clients are located on the directly connected internal network. Dynamic auto PAT must be configured. Drag and drop the NAT rules from the left onto the corresponding targets on the right. Not all options are used.

Options:

Question 38

Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)

Options:

A.

An option to re-apply NAT and VPN policies during registration is available, so users do not need to re- apply the policies after registration is completed.

B.

Before re-adding the device in Cisco FMC, you must add the manager back in the device.

C.

No option to delete and re-add a device is available in the Cisco FMC web interface.

D.

The Cisco FMC web interface prompts users to re-apply access control policies.

E.

No option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the policies after registration is completed.

Question 39

Cisco Security Analytics and Logging SaaS licenses come with how many days of data retention by default?

Options:

A.

60

B.

365

C.

90

D.

120

Question 40

A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?

Options:

A.

Add the hash to the simple custom deletion list.

B.

Use regular expressions to block the malicious file.

C.

Enable a personal firewall in the infected endpoint.

D.

Add the hash from the infected endpoint to the network block list.

Question 41

After using Firepower for some time and learning about how it interacts with the network, an administrator is trying to correlate malicious activity with a user Which widget should be configured to provide this visibility on the Cisco Firepower dashboards?

Options:

A.

Custom Analysis

B.

Current Status

C.

Current Sessions

D.

Correlation Events

Question 42

What is a feature of Cisco AMP private cloud?

Options:

A.

It supports anonymized retrieval of threat intelligence

B.

It supports security intelligence filtering.

C.

It disables direct connections to the public cloud.

D.

It performs dynamic analysis

Question 43

An engineer has been asked to show application usages automatically on a monthly basis and send the information to management What mechanism should be used to accomplish this task?

Options:

A.

event viewer

B.

reports

C.

dashboards

D.

context explorer

Question 44

An administrator is adding a QoS policy to a Cisco FTD deployment. When a new rule is added to the policy and QoS is applied on 'Interfaces in Destination Interface Objects", no interface objects are available What is the problem?

Options:

A.

The FTD is out of available resources lor use. so QoS cannot be added

B.

The network segments that the interfaces are on do not have contiguous IP space

C.

QoS is available only on routed interfaces, and this device is in transparent mode.

D.

A conflict exists between the destination interface types that is preventing QoS from being added

Question 45

Refer to the exhibit. An engineer is configuring an instance of Cisco Secure Firewall Threat Defense with interfaces in IPS Inline Pair mode. What must be configured on interface e1/6 to accomplish the requirement?

Options:

A.

propagate link state disabled

B.

inline set MTU set to 1500

C.

FailSafe disabled

D.

security zone set to OUTSIDE_ZONE

Question 46

An engineer is investigating connectivity problems on Cisco Firepower that is using service group tags. Specific devices are not being tagged correctly, which is preventing clients from using the proper policies when going through the firewall How is this issue resolved?

Options:

A.

Use traceroute with advanced options.

B.

Use Wireshark with an IP subnet filter.

C.

Use a packet capture with match criteria.

D.

Use a packet sniffer with correct filtering

Question 47

A Cisco FTD device is running in transparent firewall mode with a VTEP bridge group member ingress interface. What must be considered by an engineer tasked with specifying a destination MAC address for a packet trace?

Options:

A.

Only the UDP packet type is supported.

B.

The output format option for the packet logs is unavailable.

C.

The destination MAC address is optional if a VLAN ID value is entered.

D.

The VLAN ID and destination MAC address are optional.

Question 48

A network engineer must provide redundancy between two Cisco FTD devices. The redundancy configuration must include automatic configuration, translation, and connection updates. After the initial configuration of the two appliances, which two steps must be taken to proceed with the redundancy configuration? (Choose two.)

Options:

A.

Configure the virtual MAC address on the failover link.

B.

Disable hellos on the inside interface.

C.

Configure the standby IP addresses.

D.

Ensure the high availability license is enabled.

E.

Configure the failover link with stateful properties.

Question 49

Which firewall mode is Cisco Secure Firewall Threat Defense in when two physical interfaces are assigned to a named BVI?

Options:

A.

Routed

B.

Transparent

C.

In-line

D.

IPS only

Question 50

An engineer is configuring a Cisco Secure Firewall Threat Defence device managed by Cisco Secure Firewall Management Centre. The device must have SSH enabled and the accessible from the inside interface for remote administration. Which type of policy must the engineer configure to accomplish this?

Options:

A.

Identify

B.

Access control

C.

Prefilter

D.

Platform settings

Question 51

Which protocol establishes network redundancy in a switched Firepower device deployment?

Options:

A.

STP

B.

HSRP

C.

GLBP

D.

VRRP

Question 52

An engineer is configuring Cisco Security Devices by using Cisco Secure Firewall Management Center. Which configuration command must be run to compare the CA certificate bundle on the local system to the latest CA bundle from the Cisco server?

Options:

A.

configure cert-update compare

B.

configure cert-update auto-update enable

C.

configure cert-update run-now

D.

configure cert-update test

Question 53

A software development company hosts the website http:dev.company.com for contractors to share code for projects they are working on with internal developers. The web server is on premises and is protected by a Cisco Secure Firewall Threat Defense appliance. The network administrator is worried about someone trying to transmit infected files to internal users via this site. Which type of policy must be able associated with an access control policy to enable Cisco Secure Firewall Malware Defense to detect and block malware?

Options:

A.

SSL policy

B.

Prefilter policy

C.

File policy

D.

Network discovery policy

Question 54

Which group within Cisco does the Threat Response team use for threat analysis and research?

Options:

A.

Cisco Deep Analytics

B.

OpenDNS Group

C.

Cisco Network Response

D.

Cisco Talos

Question 55

What is the benefit of selecting the trace option for packet capture?

Options:

A.

The option indicates whether the packet was dropped or successful.

B.

The option indicated whether the destination host responds through a different path.

C.

The option limits the number of packets that are captured.

D.

The option captures details of each packet.

Question 56

An administrator is setting up Cisco Firepower to send data to the Cisco Stealthwatch appliances. The NetFlow_Set_Parameters object is already created, but NetFlow is not being sent to the flow collector. What must be done to prevent this from occurring?

Options:

A.

Add the NetFlow_Send_Destination object to the configuration

B.

Create a Security Intelligence object to send the data to Cisco Stealthwatch

C.

Create a service identifier to enable the NetFlow service

D.

Add the NetFlow_Add_Destination object to the configuration

Question 57

A network administrator is trying to configure an access rule to allow access to a specific banking site over HTTPS. Which method must the administrator use to meet the requirement?

Options:

A.

Enable SSL decryption and specify the URL.

B.

Define the URL to be blocked and set the application to HTTP.

C.

Define the URL to be blocked and disable SSL inspection.

D.

Block the category of banking and define the application of WWW.

Question 58

An engineer must deploy a Cisco FTD appliance via Cisco FMC to span a network segment to detect malware and threats. When setting the Cisco FTD interface mode, which sequence of actions meets this requirement?

Options:

A.

Set to passive, and configure an access control policy with an intrusion policy and a file policy defined

B.

Set to passive, and configure an access control policy with a prefilter policy defined

C.

Set to none, and configure an access control policy with a prefilter policy defined

D.

Set to none, and configure an access control policy with an intrusion policy and a file policy defined

Question 59

Refer to the exhibit.

And engineer is analyzing the Attacks Risk Report and finds that there are over 300 instances of new operating systems being seen on the network How is the Firepower configuration updated to protect these new operating systems?

Options:

A.

Cisco Firepower automatically updates the policies.

B.

The administrator requests a Remediation Recommendation Report from Cisco Firepower

C.

Cisco Firepower gives recommendations to update the policies.

D.

The administrator manually updates the policies.

Question 60

IT management is asking the network engineer to provide high-level summary statistics of the Cisco FTD appliance in the network. The business is approaching a peak season so the need to maintain business uptime is high. Which report type should be used to gather this information?

Options:

A.

Malware Report

B.

Standard Report

C.

SNMP Report

D.

Risk Report

Question 61

A consultant Is working on a project where the customer is upgrading from a single Cisco Firepower 2130 managed by FDM to a pair of Cisco Firepower 2130s managed oy FMC tor nigh availability. The customer wants the configures of the existing device being managed by FDM to be carried over to FMC and then replicated to the additional: device being added to create the high availability pair. Which action must the consultant take to meet this requirement?

Options:

A.

The current FDM configuration must be configured by hand into FMC before the devices are registered.

B.

The current FDM configuration will be converted automatically into FMC when the device registers.

C.

The current FDM configuration must be migrated to FMC using the Secure Firewall Migration Tool.

D.

The FTD configuration must be converted to ASA command format, which can then be migrated to FMC.

Question 62

An engineer is deploying Cisco Secure Endpoint for the first time and on endpoint with MAC address 50:54:15:04:0:AB. The engineer must make sure that during the testing phase no files are isolated and network connections must not be blocked. Which policy type must be configured to accomplish the task?

Options:

A.

Triage

B.

Quarantine

C.

Protect

D.

Audit

Question 63

When using Cisco Threat Response, which phase of the Intelligence Cycle publishes the results of the investigation?

Options:

A.

direction

B.

dissemination

C.

processing

D.

analysis

Question 64

Which protocol is needed to exchange threat details in rapid threat containment on Cisco FMC?

Options:

A.

SGT

B.

SNMP v3

C.

BFD

D.

pxGrid

Question 65

An engineer is monitoring network traffic from their sales and product development departments, which are on two separate networks What must be configured in order to maintain data privacy for both departments?

Options:

A.

Use a dedicated IPS inline set for each department to maintain traffic separation

B.

Use 802 1Q mime set Trunk interfaces with VLANs to maintain logical traffic separation

C.

Use passive IDS ports for both departments

D.

Use one pair of inline set in TAP mode for both departments

Question 66

What is the advantage of having Cisco Firepower devices send events to Cisco Threat response via the security services exchange portal directly as opposed to using syslog?

Options:

A.

Firepower devices do not need to be connected to the internet.

B.

All types of Firepower devices are supported.

C.

Supports all devices that are running supported versions of Firepower

D.

An on-premises proxy server does not need to set up and maintained

Question 67

A network administrator is configuring a Cisco AMP public cloud instance and wants to capture infections and polymorphic variants of a threat to help detect families of malware. Which detection engine meets this requirement?

Options:

A.

RBAC

B.

Tetra

C.

Ethos

D.

Spero

Question 68

Network users experience issues when accessing a server on a different network segment. An engineer investigates the issue by performing packet capture on Cisco Secure Firewall Threat Defense. The engineer expects more data and suspects that not all the traffic was collected during a 15-minute can’t captured session. Which action must the engineer take to resolve the issue?

Options:

A.

Forward the captured data lo an FTP server

B.

Increase the amount of RAM allocated for the capture.

C.

Provide a file name to save the data.

D.

Ensure that the allocated memory is sufficient.

Question 69

How many report templates does the Cisco Firepower Management Center support?

Options:

A.

20

B.

10

C.

5

D.

unlimited

Question 70

A company is deploying Cisco Secure Endpoint private cloud. The Secure Endpoint private cloud instance has already been deployed by the server administrator. The server administrator provided the hostname of the private cloud instance to the network engineer via email. What additional information does the network engineer require from the server administrator to be able to make the connection to Secure Endpoint private cloud in Cisco Secure Firewall Management Centre?

Options:

A.

SSL certificate for the Secure Endpoint ornate cloud instance

B.

Internet access for the Secure End point private cloud to reach the Secure Endpoint public cloud

C.

Username and password to the Secure Endpoint private cloud instance

D.

IP address and port number for the connection proxy

Question 71

An engineer currently has a Cisco FTD device registered to the Cisco FMC and is assigned the address of 10 10.50.12. The organization is upgrading the addressing schemes and there is a requirement to convert the addresses to a format that provides an adequate amount of addresses on the network What should the engineer do to ensure that the new addressing takes effect and can be used for the Cisco FTD to Cisco FMC connection?

Options:

A.

Delete and reregister the device to Cisco FMC

B.

Update the IP addresses from IFV4 to IPv6 without deleting the device from Cisco FMC

C.

Format and reregister the device to Cisco FMC.

D.

Cisco FMC does not support devices that use IPv4 IP addresses.

Question 72

An analyst is reviewing the Cisco FMC reports for the week. They notice that some peer-to-peer applications are being used on the network and they must identify which poses the greatest risk to the environment. Which report gives the analyst this information?

Options:

A.

Attacks Risk Report

B.

User Risk Report

C.

Network Risk Report

D.

Advanced Malware Risk Report

Question 73

Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat Containment?

Options:

A.

pxGrid

B.

FTD RTC

C.

FMC RTC

D.

ISEGrid

Question 74

Which two considerations must be made when deleting and re-adding devices while managing them via Cisco FMC (Choose two).

Options:

A.

Before re-adding the device In Cisco FMC, the manager must be added back.

B.

The Cisco FMC web interface prompts users to re-apply access control policies.

C.

Once a device has been deleted, It must be reconfigured before it is re-added to the Cisco FMC.

D.

An option to re-apply NAT and VPN policies during registration is available, so users do not need to re-apply the polices after registration is completed.

E.

There is no option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the policies after registration is completed.

Question 75

Refer to the exhibit.

What must be done to fix access to this website while preventing the same communication to all other websites?

Options:

A.

Create an intrusion policy rule to have Snort allow port 80 to only 172.1.1 50.

B.

Create an access control policy rule to allow port 80 to only 172.1.1 50.

C.

Create an intrusion policy rule to have Snort allow port 443 to only 172.1.1.50

D.

Create an access control policy rule to allow port 443 to only 172.1.1 50

Question 76

An administrator is attempting to remotely log into a switch in the data centre using SSH and is unable to connect. How does the administrator confirm that traffic is reaching the firewall?

Options:

A.

by running Wireshark on the administrator's PC

B.

by performing a packet capture on the firewall.

C.

by running a packet tracer on the firewall.

D.

by attempting to access it from a different workstation.

Question 77

Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choosetwo.)

Options:

A.

OSPFv2 with IPv6 capabilities

B.

virtual links

C.

SHA authentication to OSPF packets

D.

area boundary router type 1 LSA filtering

E.

MD5 authentication to OSPF packets

Question 78

An engineer is configuring URL filtering for a Cisco FTD device in Cisco FMC. Users must receive a warning when they access http:/' 'additstte.corn with the option of continuing to the website if they choose to. No other websites should be blacked. Which two actions must the engineer lake to meet these requirements? (Choose two.)

Options:

A.

On the HTTP Responses tab of the access control policy editor, set the Block Response Page to Custom.

B.

On the HTTP Responses tab of the access control policy editor, sot the Interactive Block Response Page to system-provided.

C.

Configure the default action for the access control policy to Interactive Block.

D.

Configure an access control rule that matches the Adult URL category and se: the action to interactive Block.

E.

Configure an access control rule that matches an URL object for http://www.badaduitslte.com; and set the action to interactive Block.

Question 79

Which interface type allows packets to be dropped?

Options:

A.

passive

B.

inline

C.

ERSPAN

D.

TAP

Question 80

Which feature issupportedby IRB on Cisco FTD devices?

Options:

A.

redundant interface

B.

dynamic routing protocol

C.

EtherChannel interface

D.

high-availability cluster

Question 81

A network administrator has converted a Cisco FTD from using LDAP to LDAPS for VPN authentication. The Cisco FMC can connect to the LDAPS server, but the Cisco FTD is not connecting. Which configuration must be enabled on the Cisco FTD?

Options:

A.

SSL must be set to a use TLSv1.2 or lower.

B.

The LDAPS must be allowed through the access control policy.

C.

DNS servers must be defined for name resolution.

D.

The RADIUS server must be defined.

Question 82

A network engineer wants to add a third-party threat feed into the Cisco FMC for enhanced threat detectionWhich action should be taken to accomplish this goal?

Options:

A.

Enable Threat Intelligence Director using STIX and TAXII

B.

Enable Rapid Threat Containment using REST APIs

C.

Enable Threat Intelligence Director using REST APIs

D.

Enable Rapid Threat Containment using STIX and TAXII

Question 83

An engineer is setting up a remote access VPN on a Cisco FTD device and wants to define which traffic gets sent over the VPN tunnel. Which named object type in Cisco FMC must be used to accomplish this task?

Options:

A.

split tunnel

B.

crypto map

C.

access list

D.

route map

Question 84

When do you need the file-size command option during troubleshooting with packet capture?

Options:

A.

when capture packets are less than 16 MB

B.

when capture packets are restricted from the secondary memory

C.

when capture packets exceed 10 GB

D.

when capture packets exceed 32 MB

Question 85

An engineer is implementing a new Cisco Secure Firewall. The firewall must filler traffic between the three subnets:

• LAN 192.168.101.0724

• DMZ 192.168 200.0/24

• WAN 10.0.0.0/30

Which firewall mode must the engineer implement?

Options:

A.

transparent

B.

network

C.

routed

D.

gateway

Question 86

Which report template field format is available in Cisco FMC?

Options:

A.

box lever chart

B.

arrow chart

C.

bar chart

D.

benchmark chart

Question 87

The event dashboard within the Cisco FMC has been inundated with low priority intrusion drop events, which are overshadowing high priority events. An engineer has been tasked with reviewing the policies and reducing the low priority events. Which action should be configured to accomplish this task?

Options:

A.

generate events

B.

drop packet

C.

drop connection

D.

drop and generate

Question 88

A network engineer is tasked with minimising traffic interruption during peak traffic limes. When the SNORT inspection engine is overwhelmed, what must be configured to alleviate this issue?

Options:

A.

Enable IPS inline link state propagation

B.

Enable Pre-filter policies before the SNORT engine failure.

C.

Set a Trust ALL access control policy.

D.

Enable Automatic Application Bypass.

Question 89

An administrator is attempting to add a new FTD device to their FMC behind a NAT device with a NAT ID of NAT001 and a password of Cisco0420l06525. The private IP address of the FMC server is 192.168.45.45. which is being translated to the public IP address of 209.165.200.225/27. Which command set must be used in order to accomplish this task?

Options:

A.

configure manager add 209.165.200.225

B.

configure manager add 192.168.45,45

C.

configure manager add 209.165.200.225 255.255.255.224

D.

configure manager add 209.165.200.225/27

Question 90

An engineer is investigating connectivity problems on Cisco Firepower for a specific SGT. Which command allows the engineer to capture real packets that pass through the firewall using an SGT of 64?

Options:

A.

capture CAP type inline-tag 64 match ip any any

B.

capture CAP match 64 type inline-tag ip any any

C.

capture CAP headers-only type inline-tag 64 match ip any any

D.

capture CAP buffer 64 match ip any any

Question 91

Which component is needed to perform rapid threat containment with Cisco FMC?

Options:

A.

ISE

B.

RESTful API

C.

SIEM

D.

DDI

Question 92

Refer to the exhibit An engineer is modifying an access control pokey to add a rule to inspect all DNS traffic that passes through the firewall After making the change and deploying thepokey they see that DNS traffic is not bang inspected by the Snort engine What is the problem?

Options:

A.

The rule must specify the security zone that originates the traffic

B.

The rule must define the source network for inspection as well as the port

C.

The action of the rule is set to trust instead of allow.

D.

The rule is configured with the wrong setting for the source port

Question 93

An engineer Is configuring a Cisco FTD device to place on the Finance VLAN to provide additional protection tor company financial data. The device must be deployed without requiring any changes on the end user workstations, which currently use DHCP lo obtain an IP address. How must the engineer deploy the device to meet this requirement?

Options:

A.

Deploy the device in routed mode and allow DHCP traffic in the access control policies.

B.

Deploy the device in routed made aid enable the DHCP Relay feature.

C.

Deploy the device in transparent mode and allow DHCP traffic in the access control policies

D.

Deploy the device in transparent mode and enable the DHCP Server feature.

Question 94

An engineer must create an access control policy on a Cisco Secure Firewall Threat Defense device. The company has a contact center that utilizes VoIP heavily, and it is critical that this traffic is not …. by performance issues after deploying the access control policy Which access control Action rule must be configured to handle the VoIP traffic?

Options:

A.

monitor

B.

trust

C.

block

D.

allow

Question 95

An engineer must configure high availability for the Cisco Firepower devices. The current network topology does not allow for two devices to pass traffic concurrently. How must the devices be implemented in this environment?

Options:

A.

in active/active mode

B.

in a cluster span EtherChannel

C.

in active/passive mode

D.

in cluster interface mode

Question 96

In which two places can thresholding settings be configured? (Choose two.)

Options:

A.

on each IPS rule

B.

globally, within the network analysis policy

C.

globally, per intrusion policy

D.

on each access control rule

E.

per preprocessor, within the network analysis policy

Question 97

An engineer attempts to pull the configuration for a Cisco FTD sensor to review with Cisco TAC but does not have direct access to the CU for the device. The CLl for the device is managed by Cisco FMC to which the engineer has access. Which action in Cisco FMC grants access to the CLl for the device?

Options:

A.

Export the configuration using the Import/Export tool within Cisco FMC.

B.

Create a backup of the configuration within the Cisco FMC.

C.

Use the show run all command in the Cisco FTD CLI feature within Cisco FMC.

D.

Download the configuration file within the File Download section of Cisco FMC.

Question 98

Which policy rule is included in the deployment of a local DMZ during the initial deployment of a Cisco NGFW through the Cisco FMC GUI?

Options:

A.

a default DMZ policy for which only a user can change the IP addresses.

B.

deny ip any

C.

no policy rule is included

D.

permit ip any

Question 99

An organization created a custom application that is being flagged by Cisco Secure Endpoint. The application must be exempt from being flagged. What is the process to meet the requirement?

Options:

A.

Modify the custom detection list to exclude me custom application.

B.

Preculculate the hash value of the custom application and add it to the allowed applications.

C.

Configure the custom application to use the information-store paths.

D.

Add the custom application to the DFC 1st and update the policy.

Question 100

An engineer must export a packet capture from Cisco Secure Firewall Management Center to assist in troubleshooting an issue an a Secure Firewall Threat Defense device. When the engineer navigates to URL for Secure Firewall Management Center at:

../capture/CAP/pcap/sample.pcap

An engineer receives a 403: Forbidden error instead of being provided with the PCAP file. Which action resolves the issue?

Options:

A.

Disable the HTTPS server and use HTTP.

B.

Enable the proxy setting in the device platform policy.

C.

Enable HTTPS in the device platform policy.

D.

Disable the proxy setting on the client browser.

Question 101

An engineer is using the configure manager add Cisc402098527 command to add a new Cisco FTD device to the Cisco FMC; however, the device is not being added. Why Is this occurring?

Options:

A.

The NAT ID is required since the Cisco FMC is behind a NAT device.

B.

The IP address used should be that of the Cisco FTD. not the Cisco FMC.

C.

DONOTRESOLVE must be added to the command

D.

The registration key is missing from the command

Question 102

An engineer must define a URL object on Cisco FMC. What is the correct method to specify the URL without performing SSL inspection?

Options:

A.

Use Subject Common Name value.

B.

Specify all subdomains in the object group.

C.

Specify the protocol in the object.

D.

Include all URLs from CRL Distribution Points.

Question 103

A security engineer must improve security in an organization and is producing a risk mitigation strategy to present to management for approval. Which action must the security engineer take based on this Attacks Risk Report?

Options:

A.

Inspect DNS traffic

B.

Block NetBIOS.

C.

Block Internal Explorer

D.

Inspect TCP port 80 traffic

Question 104

An engineer has been tasked with using Cisco FMC to determine if files being sent through the network are malware. Which two configuration tasks must be performed to achieve this file lookup? (Choose two).

Options:

A.

The Cisco FMC needs to include a SSL decryption policy.

B.

The Cisco FMC needs to connect to the Cisco AMP for Endpoints service.

C.

The Cisco FMC needs to connect to the Cisco ThreatGrid service directly for sandboxing.

D.

The Cisco FMC needs to connect with the FireAMP Cloud.

E.

The Cisco FMC needs to include a file inspection policy for malware lookup.

Question 105

Which process should be checked when troubleshooting registration issues between Cisco FMC and managed devices to verify that secure communication is occurring?

Options:

A.

fpcollect

B.

dhclient

C.

sfmgr

D.

sftunnel

Question 106

Which communication is blocked from the bridge groups when multiple are configured in transparent mode on a Cisco Secure Firewall Threat Defense appliance?

Options:

A.

With client devices

B.

With other routers

C.

With each other

D.

With the internet

Question 107

A company is deploying intrusion protection on multiple Cisco FTD appliances managed by Cisco FMC. Which system-provided policy must be selected if speed and detection are priorities?

Options:

A.

Connectivity Over Security

B.

Security Over Connectivity

C.

Maximum Detection

D.

Balanced Security and Connectivity

Question 108

Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC from the left into the correct order on the right. Not all options are used.

Options:

Question 109

Which command should be used on the Cisco FTD CLI to capture all the packets that hit an interface?

Options:

A.

configure coredump packet-engine enable

B.

capture-traffic

C.

capture

D.

capture WORD

Question 110

Refer to the exhibit.

An engineer generates troubleshooting files in Cisco Secure Firewall Management Center (FMC). A successfully completed task Is removed before the files are downloaded. Which two actions must be taken to determine the filename and obtain the generated troubleshooting files without regenerating them? (Choose two.)

Options:

A.

Use an FTP client Hi expert mode on Secure FMC lo upload the files to the FTP server.

B.

Go to the same screen as shown in the exhibit, click Advanced Troubleshooting, enter the rile name, and then start the download

C.

Connect to CU on the FTD67 and FTD66 devices and copy the tiles from flash to the PIP server.

D.

Go to expert mode on Secure FMC. list the contents of/Var/common, and determine the correct filename from the output

E.

Click System Monitoring, men Audit to determine the correct filename from the line containing the Generate Troubleshooting Files string.

Question 111

An engineer is troubleshooting HTTP traffic to a web server using the packet capture tool on Cisco FMC. When reviewing the captures, the engineer notices that there are a lot of packets that are not sourced from or destined to the web server being captured. How can the engineer reduce the strain of capturing packets for irrelevant traffic on the Cisco FTD device?

Options:

A.

Use the host filter in the packet capture to capture traffic to or from a specific host.

B.

Redirect the packet capture output to a. pcap file that can be opened with Wireshark.

C.

Use the -c option to restrict the packet capture to only the first 100 packets.

D.

Use an access-list within the packet capture to permit only HTTP traffic to and from the web server.

Question 112

Refer to the exhibit. An engineer must configure a connection on a Cisco ASA Firewall with a Cisco Secure Firewall Services Module to ensure that the secondary interface takes over all the functions of the primary interface if the primary interface fails. Drag and drop the code snippets from the bottom onto the boxes in the CLI commands to configure the failover. Not all options are used.

Options:

Question 113

What is a method used by Cisco Rapid Threat Containment to contain the threat in the network?

Options:

A.

change of authentication

B.

share context data

C.

TACACS+

D.

trustsec segmentation

Question 114

An engineer must change the mode of a Cisco Secure Firewall Threat Defense (FTD) firewall in the Cisco Secure Firewall Management Center (FMC) inventory. The engineer must take these actions:

• Register Secure FTD with Secure FMC.

• Change the firewall mode.

• Deregister the Secure FTD device from Secure FMC.

How must the engineer take FTD take the actions?

Options:

A.

Reload the Secure FTD device.

B.

Configure the management IP address.

C.

Access the Secure FTD CLI from the console port.

D.

Erase the Secure FTD configuration

Question 115

A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?

Options:

A.

Use regular expressions to block the malicious file.

B.

Add the hash from the infected endpoint to the network block list.

C.

Add the hash to the simple custom detection list.

D.

Enable a personal firewall in the infected endpoint.

Page: 1 / 39
Total 385 questions