Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Securing Networks with Cisco Firepower (300-710 SNCF) Question and Answers

Securing Networks with Cisco Firepower (300-710 SNCF)

Last Update Nov 30, 2025
Total Questions : 385

We are offering FREE 300-710 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-710 free exam questions and then go for complete pool of Securing Networks with Cisco Firepower (300-710 SNCF) test questions that will help you more.

300-710 pdf

300-710 PDF

$40.25  $114.99
300-710 Engine

300-710 Testing Engine

$47.25  $134.99
300-710 PDF + Engine

300-710 PDF + Testing Engine

$61.25  $174.99
Questions 1

An organization has seen a lot of traffic congestion on their links going out to the internet There is a Cisco Firepower device that processes all of the traffic going to the internet prior to leaving the enterprise. How is the congestion alleviated so that legitimate business traffic reaches the destination?

Options:

A.  

Create a flexconfig policy to use WCCP for application aware bandwidth limiting

B.  

Create a VPN policy so that direct tunnels are established to the business applications

C.  

Create a NAT policy so that the Cisco Firepower device does not have to translate as many addresses

D.  

Create a QoS policy rate-limiting high bandwidth applications

Discussion 0
Questions 2

The event dashboard within the Cisco FMC has been inundated with low priority intrusion drop events, which are overshadowing high priority events. An engineer has been tasked with reviewing the policies and reducing the low priority events. Which action should be configured to accomplish this task?

Options:

A.  

generate events

B.  

drop packet

C.  

drop connection

D.  

drop and generate

Discussion 0
Questions 3

Which action must be taken on the Cisco FMC when a packet bypass is configured in case the Snort engine is down or a packet takes too long to process?

Options:

A.  

Enable Inspect Local Router Traffic

B.  

Enable Automatic Application Bypass

C.  

Configure Fastpath rules to bypass inspection

D.  

Add a Bypass Threshold policy for failures

Discussion 0
Questions 4

An engineer is integrating Cisco Secure Endpoint with Cisco Secure Firewall Management Center in high availability mode. Malware events detected by Secure Endpoint must also be

received by Secure Firewall Management Center and public cloud services are used. Which two configurations must be selected on both high availability peers independently? (Choose two.)

Options:

A.  

internet connection

B.  

Smart Software Manager Satellite

C.  

Cisco Success Network

D.  

security group tag

E.  

Secure Endpoint Cloud Connection

Discussion 0
Questions 5

Which default action setting in a Cisco FTD Access Control Policy allows all traffic from an undefined application to pass without Snort Inspection?

Options:

A.  

Trust All Traffic

B.  

Inherit from Base Policy

C.  

Network Discovery Only

D.  

Intrusion Prevention

Discussion 0
Questions 6

What is a behavior of a Cisco FMC database purge?

Options:

A.  

User login and history data are removed from the database if the User Activity check box is selected.

B.  

Data can be recovered from the device.

C.  

The appropriate process is restarted.

D.  

The specified data is removed from Cisco FMC and kept for two weeks.

Discussion 0
Questions 7

Which Cisco Rapid Threat Containment mitigation action is enabled by integrating pxGrid Adaptive Network Control with Cisco ISE and Cisco Secure Firewall Management Center?

Options:

A.  

Block

B.  

Terminate

C.  

Suspend

D.  

Reject

Discussion 0
Questions 8

A network engineer must provide redundancy between two Cisco FTD devices. The redundancy configuration must include automatic configuration, translation, and connection updates. After the initial configuration of the two appliances, which two steps must be taken to proceed with the redundancy configuration? (Choose two.)

Options:

A.  

Configure the virtual MAC address on the failover link.

B.  

Disable hellos on the inside interface.

C.  

Configure the standby IP addresses.

D.  

Ensure the high availability license is enabled.

E.  

Configure the failover link with stateful properties.

Discussion 0
Questions 9

A network engineer is deploying a pair of Cisco Secure Firewall Threat Defense devices managed by Cisco Secure Firewall Management Center tor High Availability Internet access is a high priority for the business and therefore they have invested in internet circuits from two different ISPs. The requirement from the customer Is that Internet access must do available to their user’s oven if one of the ISPs is down. Which two features must be deployed to achieve this requirement? (Choose two.)

Options:

A.  

EtherChannel interfaces

B.  

Route Tracking

C.  

SLA Monitor

D.  

Redundant interfaces

E.  

BGP

Discussion 0
Questions 10

Which CLI command is used to control special handling of ClientHello messages?

Options:

A.  

system support ssl-client-hello-tuning

B.  

system support ssl-client-hello-display

C.  

system support ssl-client-hello-force-reset

D.  

system support ssl-client-hello-enabled

Discussion 0
Questions 11

An administrator configures the interfaces of a Cisco Secure Firewall Threat Defence device in an inline IPS deployment. The administrator completes these actions:

* identifies the device and the interfaces

* sets the interface mode to inline

* enables the interlaces

Which configuration step must the administrator take next to complete the implementation?

Options:

A.  

Enable spanning-tree PortFast on the interfaces.

B.  

Configure an inline set

C.  

Set the interface to Transparent mode.

D.  

Set the interface to routed mode.

Discussion 0
Questions 12

Which Cisco Firepower feature is used to reduce the number of events received in a period of time?

Options:

A.  

rate-limiting

B.  

suspending

C.  

correlation

D.  

thresholding

Discussion 0
Questions 13

A Cisco FTD has two physical interfaces assigned to a BVI. Each interface is connected to a different VLAN on the same switch. Which firewall mode is the Cisco FTD set up to support?

Options:

A.  

active/active failover

B.  

transparent

C.  

routed

D.  

high availability clustering

Discussion 0
Questions 14

An administrator is optimizing the Cisco FTD rules to improve network performance, and wants to bypass inspection for certain traffic types to reduce the load on the Cisco FTD. Which policy must be configured to accomplish this goal?

Options:

A.  

prefilter

B.  

intrusion

C.  

identity

D.  

URL filtering

Discussion 0
Questions 15

An engineer is reviewing a ticket that requests to allow traffic for some devices that must connect to a server over 8699/udp. The request mentions only one IP address, 172.16.18.15, but the requestor asked for the engineer to open the port for all machines that have been trying to connect to it over the last week. Which action must the engineer take to troubleshoot this issue?

Options:

A.  

Use the context explorer to see the application blocks by protocol.

B.  

Use the context explorer to see the destination port blocks

C.  

Filter the connection events by the source port 8699/udp.

D.  

Filter the connection events by the destination port 8699/udp.

Discussion 0
Questions 16

An engineer is deploying a Cisco Secure Firewall Management Center appliance. The company must send data to Cisco Secure Network Analytics appliances. Which two actions must the engineer take? (Choose two.)

Options:

A.  

Configure Security Intelligence object to send data to Cisco Secure Network Analytics.

B.  

Add the Netflow_Send_Destination object to the configuration.

C.  

Add the Netflow_Add_Destination object to the configuration.

D.  

Add the Netflow_Set_Parameters object to the configuration.

E.  

Create a service identifier to enable the NetFlow service.

Discussion 0
Questions 17

A network administrator registered a new FTD to an existing FMC. The administrator cannot place the FTD in transparent mode. Which action enables transparent mode?

Options:

A.  

Add a Bridge Group Interface to the FTD before transparent mode is configured.

B.  

Dereglster the FTD device from FMC and configure transparent mode via the CLI.

C.  

Obtain an FTD model that supports transparent mode.

D.  

Assign an IP address to two physical interfaces.

Discussion 0
Questions 18

An analyst is investigating a potentially compromised endpoint within the network and pulls a host report for the endpoint in question to collect metrics and documentation. What information should be taken from this report for the investigation?

Options:

A.  

client applications by user, web applications, and user connections

B.  

number of attacked machines, sources of the attack, and traffic patterns

C.  

intrusion events, host connections, and user sessions

D.  

threat detections over time and application protocols transferring malware

Discussion 0
Questions 19

An administrator is configuring the interface of a Cisco Secure Firewall Threat Defense device in a passive IPS deployment. The device and interface have been identified. Which set of configuration steps of the administrator take next to complete the implementation?

Options:

A.  

Set the interface mode to passive. Associate the interface with a security zone. Set the MTU parameter. Reset the interface.

B.  

Modify the interface to retransmit received traffic. Associate the interface with a security zone Enable the interface. Sat the MTU parameter.

C.  

Modify the interface to retransmit received traffic. Associate the interface with a security zone. Set the MTU parameter.

D.  

Set the interface mode to passive. Associate the interface with a security zone. Enable the interface. Set the MTU parameter.

Discussion 0
Questions 20

What is a characteristic of bridge groups on a Cisco FTD?

Options:

A.  

In routed firewall mode, routing between bridge groups must pass through a routed interface.

B.  

In routed firewall mode, routing between bridge groups is supported.

C.  

In transparent firewall mode, routing between bridge groups is supported

D.  

Routing between bridge groups is achieved only with a router-on-a-stick configuration on a connected router

Discussion 0
Questions 21

How should a high-availability pair of Cisco Secure Firewall Threat Defense Virtual appliances be deployed to Cisco Secure Firewall Management Center?

Options:

A.  

Configure high availability first, then add only the primary Cisco Secure Firewall Threat Defense Virtual appliance to Cisco Secure Firewall Management Center.

B.  

Add the primary and secondary Cisco Secure Firewall Threat Defense Virtual appliances to Cisco Secure Firewall Management Center first, then configure high availability.

C.  

Add the primary appliance to Cisco Secure Firewall Management Center first, then configure high availability.

D.  

Configure high availability first, then add the primary and secondary appliances to Cisco Secure Firewall Management Center.

Discussion 0
Questions 22

A network administrator is deploying a Cisco IPS appliance and needs it to operate initially without affecting traffic flows.

It must also collect data to provide a baseline of unwanted traffic before being reconfigured to drop it. Which Cisco IPS mode meets these requirements?

Options:

A.  

failsafe

B.  

inline tap

C.  

promiscuous

D.  

bypass

Discussion 0
Questions 23

An engineer attempts to pull the configuration for a Cisco FTD sensor to review with Cisco TAC but does not have direct access to the CU for the device. The CLl for the device is managed by Cisco FMC to which the engineer has access. Which action in Cisco FMC grants access to the CLl for the device?

Options:

A.  

Export the configuration using the Import/Export tool within Cisco FMC.

B.  

Create a backup of the configuration within the Cisco FMC.

C.  

Use the show run all command in the Cisco FTD CLI feature within Cisco FM

C.  

D.  

Download the configuration file within the File Download section of Cisco FMC.

Discussion 0
Questions 24

Refer to the exhibit.

A systems administrator conducts a connectivity test to their SCCM server from a host machine and gets no response from the server. Which action ensures that the ping packets reach the destination and that the host receives replies?

Options:

A.  

Create an access control policy rule that allows ICMP traffic.

B.  

Configure a custom Snort signature to allow ICMP traffic after Inspection.

C.  

Modify the Snort rules to allow ICMP traffic.

D.  

Create an ICMP allow list and add the ICMP destination to remove it from the implicit deny list.

Discussion 0
Questions 25

The network administrator wants to enhance the network security posture by enabling machine learning tor malware detection due to a concern with suspicious Microsoft executable file types that were seen while creating monthly security reports for the CIO. Which feature must be enabled to accomplish this goal?

Options:

A.  

Spero

B.  

dynamic analysis

C.  

static analysis

D.  

Ethos

Discussion 0
Questions 26

Which component simplifies incident investigation with Cisco Threat Response?

Options:

A.  

Cisco AMP client

B.  

local CVE database

C.  

Cisco Secure Firewall appliance

D.  

browser plug-in

Discussion 0
Questions 27

A network administrator notices that SI events are not being updated The Cisco FTD device is unable to load all of the SI event entries and traffic is not being blocked as expected. What must be done to correct this issue?

Options:

A.  

Restart the affected devices in order to reset the configurations

B.  

Manually update the SI event entries to that the appropriate traffic is blocked

C.  

Replace the affected devices with devices that provide more memory

D.  

Redeploy configurations to affected devices so that additional memory is allocated to the SI module

Discussion 0
Questions 28

A network engineer must configure the cabling between a Cisco Secure Firewall Threat Defense appliance and a network so the Secure Firewall Threat Defense appliance performs inline to analyze and tune generated intrusion events before going live. Which Secure Firewall Threat Defense interface mode must the engineer use?

Options:

A.  

bypass

B.  

link state propagation

C.  

tap mode

D.  

strict TCP enforcement

Discussion 0
Questions 29

An organization has a Cisco IPS running in inline mode and is inspecting traffic for malicious activity. When traffic is received by the Cisco IRS, if it is not dropped, how does the traffic get to its destination?

Options:

A.  

It is retransmitted from the Cisco IPS inline set.

B.  

The packets are duplicated and a copy is sent to the destination.

C.  

It is transmitted out of the Cisco IPS outside interface.

D.  

It is routed back to the Cisco ASA interfaces for transmission.

Discussion 0
Questions 30

An engineer must deny ICMP traffic to the networks of separate departments that use Cisco Secure Firewall Management Center. The engineer must use the same object on the relevant device for each network. What must be configured in Secure Firewall Management Center?

Options:

A.  

IP address

B.  

IP range

C.  

Deny ICMP check box

D.  

Allow Overrides check box

Discussion 0
Questions 31

An administrator is adding a new URL-based category feed to the Cisco FMC for use within the policies. The intelligence source does not use STIX. but instead uses a .txt file format. Which action ensures that regular updates are provided?

Options:

A.  

Add a URL source and select the flat file type within Cisco FMC.

B.  

Upload the .txt file and configure automatic updates using the embedded URL.

C.  

Add a TAXII feed source and input the URL for the feed.

D.  

Convert the .txt file to STIX and upload it to the Cisco FMC.

Discussion 0
Questions 32

An engineer must define a URL object on Cisco FMC. What is the correct method to specify the URL without performing SSL inspection?

Options:

A.  

Use Subject Common Name value.

B.  

Specify all subdomains in the object group.

C.  

Specify the protocol in the object.

D.  

Include all URLs from CRL Distribution Points.

Discussion 0
Questions 33

A network engineer is tasked with minimising traffic interruption during peak traffic limes. When the SNORT inspection engine is overwhelmed, what must be configured to alleviate this issue?

Options:

A.  

Enable IPS inline link state propagation

B.  

Enable Pre-filter policies before the SNORT engine failure.

C.  

Set a Trust ALL access control policy.

D.  

Enable Automatic Application Bypass.

Discussion 0
Questions 34

With Cisco FTD software, which interface mode must be configured to passively receive traffic that passes through the appliance?

Options:

A.  

ERSPAN

B.  

IPS-only

C.  

firewall

D.  

tap

Discussion 0
Questions 35

Which communication is blocked from the bridge groups when multiple are configured in transparent mode on a Cisco Secure Firewall Threat Defense appliance?

Options:

A.  

With client devices

B.  

With other routers

C.  

With each other

D.  

With the internet

Discussion 0
Questions 36

A security analyst must create a new report within Cisco FMC to show an overview of the daily attacks, vulnerabilities, and connections. The analyst wants to reuse specific dashboards from other reports to create this consolidated one. Which action accomplishes this task?

Options:

A.  

Create a new dashboard object via Object Management to represent the desired views.

B.  

Modify the Custom Workflows within the Cisco FMC to feed the desired data into the new report.

C.  

Copy the Malware Report and modify the sections to pull components from other reports.

D.  

Use the import feature in the newly created report to select which dashboards to add.

Discussion 0
Questions 37

Refer to the exhibit. An engineer analyzes a Network Risk Report from Cisco Secure Firewall Management Center. What should the engineer recommend implementing to mitigate the risk?

Options:

A.  

IP address and URL blacklisting

B.  

Trend analysis

C.  

Network-based detection

D.  

Virtual protection

Discussion 0
Questions 38

An analyst is reviewing the Cisco FMC reports for the week. They notice that some peer-to-peer applications are being used on the network and they must identify which poses the greatest risk to the environment. Which report gives the analyst this information?

Options:

A.  

Attacks Risk Report

B.  

User Risk Report

C.  

Network Risk Report

D.  

Advanced Malware Risk Report

Discussion 0
Questions 39

An engineer must integrate a thud-party security Intelligence teed with Cisco Secure Firewall Management Center. Secure Firewall Management Center is running Version 6.2 3 and has 8 GB of memory. Which two actions must be taken to implement Throat Intelligence Director? (Choose two.)

Options:

A.  

Upgrade to version 6.6.

B.  

Enable REST API access.

C.  

Add the URL of the TAXII server.

D.  

Add 7 GB of memory.

E.  

Add a TAXII server

Discussion 0
Questions 40

Refer to the exhibit. A security engineer must improve security in an organization and is producing a risk mitigation strategy to present to management for approval. Which action must the security engineer take based on this Attacks Risk Report?

Options:

A.  

Block Internet Explorer.

B.  

Block NetBIOS.

C.  

Inspect TCP port 80 traffic.

D.  

Inspect DNS traffic.

Discussion 0
Questions 41

A network administrator is trying to configure a previously created file policy on a new access policy. Which action must the administrator take before applying the file policy?

Options:

A.  

Set up an inspection policy.

B.  

Create a new access control rule.

C.  

Assign the file policy to the default action.

D.  

Apply an application to an access control rule.

Discussion 0
Questions 42

A network administrator is implementing an active/passive high availability Cisco FTD pair.

When adding the high availability pair, the administrator cannot select the secondary peer.

What is the cause?

Options:

A.  

The second Cisco FTD is not the same model as the primary Cisco FTD.

B.  

An high availability license must be added to the Cisco FMC before adding the high availability pair.

C.  

The failover link must be defined on each Cisco FTD before adding the high availability pair.

D.  

Both Cisco FTD devices are not at the same software Version

Discussion 0
Questions 43

An engineer defines a new rule while configuring an Access Control Policy. After deploying the policy, the rule is not working as expected and the hit counters associated with the rule are showing zero. What is causing this error?

Options:

A.  

Logging is not enabled for the rule.

B.  

The rule was not enabled after being created.

C.  

The wrong source interface for Snort was selected in the rule.

D.  

An incorrect application signature was used in the rule.

Discussion 0
Questions 44

An engineer is configuring two new Cisco FTD devices to replace the existing high availability firewall pair in a highly secure environment. The information exchanged between the FTD devices over the failover link must be encrypted. Which protocol supports this on the Cisco FTD?

Options:

A.  

IPsec

B.  

SSH

C.  

SSL

D.  

MACsec

Discussion 0
Questions 45

What is an advantage of adding multiple inline interface pairs to the same inline interface set when deploying an asynchronous routing configuration?

Options:

A.  

Allows the IPS to identify inbound and outbound traffic as part of the same traffic flow.

B.  

The interfaces disable autonegotiation and interface speed is hard coded set to 1000 Mbps.

C.  

Allows traffic inspection to continue without interruption during the Snort process restart.

D.  

The interfaces are automatically configured as a media-independent interface crossover.

Discussion 0
Questions 46

A network administrator is troubleshooting access to a website hosted behind a Cisco FTD device External clients cannot access the web server via HTTPS The IP address configured on the web server is 192 168 7.46 The administrator is running the command capture CAP interface outside match ip any 192.168.7.46 255.255.255.255 but cannot see any traffic in the capture Why is this occurring?

Options:

A.  

The capture must use the public IP address of the web server.

B.  

The FTD has no route to the web server.

C.  

Theaccess policy is blocking the traffic.

D.  

The packet capture shows only blocked traffic

Discussion 0
Questions 47

A network administrator is configuring Snort inspection policies and is seeing failed deployment messages in Cisco FMC. What information should the administrator generate for Cisco TAC to help troubleshoot?

Options:

A.  

A "show tech" file for the device in question.

B.  

A "troubleshoot" file for the device in question.

C.  

A "troubleshoot" file for the Cisco FM

C.  

D.  

A "show tech" for the Cisco FMC.

Discussion 0
Questions 48

An engineer needs to configure remote storage on Cisco FMC. Configuration backups must be available from a secure location on the network for disaster recovery. Reports need to back up to a shared location that auditors can access with their Active Directory logins. Which strategy must the engineer use to meet these objectives?

Options:

A.  

Use SMB for backups and NFS for reports.

B.  

Use NFS for both backups and reports.

C.  

Use SMB for both backups and reports.

D.  

Use SSH for backups and NFS for reports.

Discussion 0
Questions 49

IT management is asking the network engineer to provide high-level summary statistics of the Cisco FTD appliance in the network. The business is approaching a peak season so the need to maintain business uptime is high. Which report type should be used to gather this information?

Options:

A.  

Malware Report

B.  

Standard Report

C.  

SNMP Report

D.  

Risk Report

Discussion 0
Questions 50

The administrator notices that there is malware present with an .exe extension and needs to verify if any of the systems on the network are running the executable file. What must be configured within Cisco AMP for Endpoints to show this data?

Options:

A.  

prevalence

B.  

threat root cause

C.  

vulnerable software

D.  

file analysis

Discussion 0
Questions 51

Which command is entered in the Cisco FMC CLI to generate a troubleshooting file?

Options:

A.  

show running-config

B.  

show tech-support chassis

C.  

system support diagnostic-cli

D.  

sudo sf_troubleshoot.pl

Discussion 0
Questions 52

A network administrator is configuring an FTD in transparent mode. A bridge group is set up and an access policy has been set up to allow all IP traffic. Traffic is not passing through the FTD. What additional configuration is needed?

Options:

A.  

The security levels of the interfaces must be set.

B.  

A default route must be added to the FTD.

C.  

An IP address must be assigned to the BVI.

D.  

A mac-access control list must be added to allow all MAC addresses.

Discussion 0
Questions 53

Network traffic coining from an organization's CEO must never be denied. Which access control policy configuration option should be used if the deployment engineer is not permitted to create a rule to allow all traffic?

Options:

A.  

Configure firewall bypass.

B.  

Change the intrusion policy from security to balance.

C.  

Configure a trust policy for the CEO.

D.  

Create a NAT policy just for the CEO.

Discussion 0
Questions 54

An engineer plans to reconfigure an existing Cisco FTD from transparent mode to routed mode. Which additional action must be taken to maintain communication Between me two network segments?

Options:

A.  

Configure a NAT rule so mat traffic between the segments is exempt from NAT.

B.  

Update the IP addressing so that each segment is a unique IP subnet.

C.  

Deploy inbound ACLs on each interface to allow traffic between the segments.

D.  

Assign a unique VLAN ID for the interface in each segment.

Discussion 0
Questions 55

A network administrator is trying to configure an access rule to allow access to a specific banking site over HTTPS. Which method must the administrator use to meet the requirement?

Options:

A.  

Enable SSL decryption and specify the URL.

B.  

Define the URL to be blocked and set the application to HTTP.

C.  

Define the URL to be blocked and disable SSL inspection.

D.  

Block the category of banking and define the application of WWW.

Discussion 0
Questions 56

An engineer must configure high availability for the Cisco Firepower devices. The current network topology does not allow for two devices to pass traffic concurrently. How must the devices be implemented in this environment?

Options:

A.  

in active/active mode

B.  

in a cluster span EtherChannel

C.  

in active/passive mode

D.  

in cluster interface mode

Discussion 0
Questions 57

Which command should be used on the Cisco FTD CLI to capture all the packets that hit an interface?

Options:

A.  

configure coredump packet-engine enable

B.  

capture-traffic

C.  

capture

D.  

capture WORD

Discussion 0
Questions 58

A network engineer wants to disable the HTTP response page and interactive blocking of the entire access control policy in Cisco Secure Firewall Management Center. What must be

selected in Block Response Page and Interactive Block Response Page?

Options:

A.  

Custom

B.  

View

C.  

System

D.  

None

Discussion 0
Questions 59

Which two remediation options are available when Cisco FMC is integrated with Cisco ISE? (Choose two.)

Options:

A.  

dynamic null route configured

B.  

DHCP pool disablement

C.  

quarantine

D.  

port shutdown

E.  

host shutdown

Discussion 0
Questions 60

Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)

Options:

A.  

application blocking

B.  

simple custom detection

C.  

file repository

D.  

exclusions

E.  

application whitelisting

Discussion 0
Questions 61

An engineer Is configuring a Cisco FTD device to place on the Finance VLAN to provide additional protection tor company financial data. The device must be deployed without requiring any changes on the end user workstations, which currently use DHCP lo obtain an IP address. How must the engineer deploy the device to meet this requirement?

Options:

A.  

Deploy the device in routed mode and allow DHCP traffic in the access control policies.

B.  

Deploy the device in routed made aid enable the DHCP Relay feature.

C.  

Deploy the device in transparent mode and allow DHCP traffic in the access control policies

D.  

Deploy the device in transparent mode and enable the DHCP Server feature.

Discussion 0
Questions 62

When do you need the file-size command option during troubleshooting with packet capture?

Options:

A.  

when capture packets are less than 16 MB

B.  

when capture packets are restricted from the secondary memory

C.  

when capture packets exceed 10 GB

D.  

when capture packets exceed 32 MB

Discussion 0
Questions 63

An engineer is creating an URL object on Cisco FMC How must it be configured so that the object will match for HTTPS traffic in an access control policy?

Options:

A.  

Specify the protocol to match (HTTP or HTTPS).

B.  

Use the FQDN including the subdomain for the website

C.  

Define the path to the individual webpage that uses HTTPS.

D.  

Use the subject common name from the website certificate

Discussion 0
Questions 64

While configuring FTD, a network engineer wants to ensure that traffic passing through the appliance does not require routing or Vlan rewriting. Which interface mode should the engineer implement to accomplish this task?

Options:

A.  

passive

B.  

transparent

C.  

Inline tap

D.  

Inline set

Discussion 0
Questions 65

What are two application layer preprocessors? (Choose two.)

Options:

A.  

CIFS

B.  

IMAP

C.  

SSL

D.  

DNP3

E.  

ICMP

Discussion 0
Questions 66

An administrator is creating interface objects to better segment their network but is having trouble adding interfaces to the objects. What is the reason for this failure?

Options:

A.  

The interfaces are being used for NAT for multiple networks.

B.  

The administrator is adding interfaces of multiple types.

C.  

The administrator is adding an interface that is in multiple zones.

D.  

The interfaces belong to multiple interface groups.

Discussion 0
Questions 67

Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?

Options:

A.  

Child domains can view but not edit dashboards that originate from an ancestor domain.

B.  

Child domains have access to only a limited set of widgets from ancestor domains.

C.  

Only the administrator of the top ancestor domain can view dashboards.

D.  

Child domains cannot view dashboards that originate from an ancestor domain.

Discussion 0
Questions 68

Remote users who connect via Cisco AnyConnect to the corporate network behind a Cisco FTD device report that they get no audio when calling between remote users using their softphones. These same users can call internal users on the corporate network without any issues. What is the cause of this issue?

Options:

A.  

The hairpinning feature is not available on FTD.

B.  

Split tunneling is enabled for the Remote Access VPN on FTD

C.  

FTDhas no NAT policy that allows outside to outside communication

D.  

The Enable Spoke to Spoke Connectivity through Hub option is not selected on FT

D.  

Discussion 0
Questions 69

What are the minimum requirements to deploy a managed device inline?

Options:

A.  

inline interfaces, security zones, MTU, and mode

B.  

passive interface, MTU, and mode

C.  

inline interfaces, MTU, and mode

D.  

passive interface, security zone, MTU, and mode

Discussion 0
Questions 70

What is the RTC workflow when the infected endpoint is identified?

Options:

A.  

Cisco ISE instructs Cisco AMP to contain the infected endpoint.

B.  

Cisco ISE instructs Cisco FMC to contain the infected endpoint.

C.  

Cisco AMP instructs Cisco FMC to contain the infected endpoint.

D.  

Cisco FMC instructs Cisco ISE to contain the infected endpoint.

Discussion 0
Questions 71

An engineer wants to connect a single IP subnet through a Cisco FTD firewall and enforce policy. There is a requirement to present the internal IP subnet to the outside as a different IP address. What must be configured to meet these requirements?

Options:

A.  

Configure the downstream router to perform NAT.

B.  

Configure the upstream router to perform NAT.

C.  

Configure the Cisco FTD firewall in routed mode with NAT enabled.

D.  

Configure the Cisco FTD firewall in transparent mode with NAT enabled.

Discussion 0
Questions 72

A network engineer implements a new Cisco Firepower device on the network to take advantage of its intrusion detection functionality. There is a requirement to analyze the traffic going across the device, alert on any malicious traffic, and appear as a bump in the wire How should this be implemented?

Options:

A.  

Specify the BVl IP address as the default gateway for connected devices.

B.  

Enable routing on the Cisco Firepower

C.  

Add an IP address to the physical Cisco Firepower interfaces.

D.  

Configure a bridge group in transparent mode.

Discussion 0
Questions 73

Refer to the exhibit.

A company is deploying a pair of Cisco Secure Firewall Threat defence devices named FTD1 and FTD2. FTD1 and FTD2 have been configured as an active/standby pair with a failover link but without a stateful link. What must be implemented next to ensure that users on the internal network still communicate with outside devices if FTD1 fails?

Options:

A.  

Disable port security on the switch interfaces connected to FTD1 and FTD2.

B.  

Set maximum secured addresses to two on the switch interfaces on FTD1 and FTD2.

C.  

Connect and configure a stateful link and thon deploy the changes.

D.  

Configure the spanning-tree PortFasI feature on SW1 and FTD2

Discussion 0
Questions 74

Refer to the exhibit An engineer is modifying an access control pokey to add a rule to inspect all DNS traffic that passes through the firewall After making the change and deploying thepokey they see that DNS traffic is not bang inspected by the Snort engine What is the problem?

Options:

A.  

The rule must specify the security zone that originates the traffic

B.  

The rule must define the source network for inspection as well as the port

C.  

The action of the rule is set to trust instead of allow.

D.  

The rule is configured with the wrong setting for the source port

Discussion 0
Questions 75

An engineer must configure high availability on two Cisco Secure Firewall Threat Defense appliances. Drag and drop the configuration steps from the left into the sequence on the right.

Options:

Discussion 0
Questions 76

Refer to the exhibit. Users attempt to connect to numerous external resources on various TCP ports. If the users mistype the port, their connection closes immediately, and it takes more than one minute before the connection is torn down. An engineer manages to capture both types of connections as shown in the exhibit. What must the engineer configure to lower the timeout values for the second group of connections and resolve the user issues?

Options:

A.  

outbound access rule that allows the entire ICMP protocol suite

B.  

inbound access rule that allows ICMP Type 3 from outside

C.  

inbound access rule that allows TCP reset packets from outside

D.  

outbound access rule with the Block with reset action

Discussion 0
Questions 77

An engineer must deploy a Cisco FTD device. Management wants to examine traffic without requiring network changes that will disrupt end users. Corporate security policy requires the separation of management traffic from data traffic and the use of SSH over Telnet for remote administration. How must the device be deployed to meet these requirements?

Options:

A.  

in routed mode with a diagnostic interface

B.  

in transparent mode with a management Interface

C.  

in transparent made with a data interface

D.  

in routed mode with a bridge virtual interface

Discussion 0
Questions 78

An organization has a compliancy requirement to protect servers from clients, however, the clients and servers all reside on the same Layer 3 network Without readdressing IP subnets for clients or servers, how is segmentation achieved?

Options:

A.  

Deploy a firewall in transparent mode between the clients and servers.

B.  

Change the IP addresses of the clients, while remaining on the same subnet.

C.  

Deploy a firewall in routed mode between the clients and servers

D.  

Change the IP addresses of the servers, while remaining on the same subnet

Discussion 0
Questions 79

A security engineer is adding three Cisco FTD devices to a Cisco FMC. Two of the devices have successfully registered to the Cisco FMC. The device that is unable to register is located behind a router that translates all outbound traffic to the router's WAN IP address. Which two steps are required for this device to register to the Cisco FMC? (Choose two.)

Options:

A.  

Reconfigure the Cisco FMC lo use the device's private IP address instead of the WAN address.

B.  

Configure a NAT ID on both the Cisco FMC and the device.

C.  

Add the port number being used for PAT on the router to the device's IP address in the Cisco FM

C.  

D.  

Reconfigure the Cisco FMC to use the device's hostname instead of IP address.

E.  

Remove the IP address defined for the device in the Cisco FMC.

Discussion 0
Questions 80

A network administrator is deploying a new Cisco Secure Firewall Threat Defense (FTD) firewall After Cisco Secure FTD is deployed, inside clients nave intermittent connectivity to each other. When … the packet capture on the Secure FTD firewall, the administrator sees that Secure FID is responding to all the AW requests on the inside network. Which action must the network administrator e to resolve the issue''

Options:

A.  

Review NAT policy and disable incorrect proxy ARP configuration.

B.  

Hardcode the MAC address of the FTD to IP mapping on client machines.

C.  

Review the access policy and verify that ARP is allowed from inside to inside.

D.  

Convert the FTD to transparent mode to allow ARP requests.

Discussion 0
Questions 81

An engineer is configuring two new Cisco Secure Firewall Threat Defense devices to replace the existing firewalls. Network traffic must be analyzed for intrusion events without impacting the traffic. What must the engineer implement next to accomplish the goal?

Options:

A.  

Passive mode

B.  

Inline Pair in Tap mode

C.  

ERSPAN Passive mode

D.  

Inline Pair mode

Discussion 0
Questions 82

A hospital network needs to upgrade their Cisco FMC managed devices and needs to ensure that a disaster recovery process is in place. What must be done in order to minimize downtime on the network?

Options:

A.  

Configure a second circuit to an ISP for added redundancy

B.  

Keep a copy of the current configuration to use as backup

C.  

Configure the Cisco FMCs for failover

D.  

Configure the Cisco FMC managed devices for clustering.

Discussion 0
Questions 83

A network engineer is planning on replacing an Active/Standby pair of physical Cisco Secure Firewall ASAs with a pair of Cisco Secure Firewall Threat Defense Virtual appliances. Which two virtual environments support the current High Availability configuration? (Choose two.)

Options:

A.  

KVM

B.  

Azure

C.  

ESXi

D.  

AWS

E.  

Openstack

Discussion 0
Questions 84

A network administrator notices that inspection has been interrupted on all non-managed interfaces of a device. What is the cause of this?

Options:

A.  

The value of the highest MTU assigned to any non-management interface was changed.

B.  

The value of the highest MSS assigned to any non-management interface was changed.

C.  

A passive interface was associated with a security zone.

D.  

Multiple inline interface pairs were added to the same inline interface.

Discussion 0
Questions 85

A network engineer is configuring URL Filtering on Firepower Threat Defense. Which two port requirements on the Firepower Management Center must be validated to allow communication with the cloud service? (Choose two.)

Options:

A.  

outbound port TCP/443

B.  

inbound port TCP/80

C.  

outbound port TCP/8080

D.  

inbound port TCP/443

E.  

outbound port TCP/80

Discussion 0
Questions 86

A network engineer detects a connectivity issue between Cisco Secure Firewall Management Centre and Cisco Secure Firewall Threat Defense Initial troubleshooting indicates that heartbeats and events not being received. The engineer re-establishes the secure channels between both peers Which two commands must the engineer run to resolve the issue? (Choose two.)

Options:

A.  

manage_procs.pl

B.  

sudo stats_unified.pl

C.  

sudo perfstats -Cq < /var/sf/rna/correlator-stats/now

D.  

show history

E.  

show disk-manager

Discussion 0
Questions 87

Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)

Options:

A.  

An option to re-apply NAT and VPN policies during registration is available, so users do not need to re- apply the policies after registration is completed.

B.  

Before re-adding the device in Cisco FMC, you must add the manager back in the device.

C.  

No option to delete and re-add a device is available in the Cisco FMC web interface.

D.  

The Cisco FMC web interface prompts users to re-apply access control policies.

E.  

No option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the policies after registration is completed.

Discussion 0
Questions 88

A company has many Cisco FTD devices managed by a Cisco FMC. The security model requires that access control rule logs be collected for analysis. The security engineer is concerned that the Cisco FMC will not be able to process the volume of logging that will be generated. Which configuration addresses this concern?

Options:

A.  

Send Cisco FTD connection events and security events directly to SIEM system for storage and analysis.

B.  

Send Cisco FTD connection events and security events to a cluster of Cisco FMC devices for storage and analysis.

C.  

Send Cisco FTD connection events and security events to Cisco FMC and configure it to forward logs to SIEM for storage and analysis.

D.  

Send Cisco FTD connection events directly to a SIEM system and forward security events from Cisco FMC to the SIEM system for storage and analysis.

Discussion 0
Questions 89

An engineer wants to change an existing transparent Cisco FTD to routed mode.

The device controls traffic between two network segments. Which action is mandatory to allow hosts to reestablish communication between these two segments after the change?

Options:

A.  

remove the existing dynamic routing protocol settings.

B.  

configure multiple BVIs to route between segments.

C.  

assign unique VLAN IDs to each firewall interface.

D.  

implement non-overlapping IP subnets on each segment.

Discussion 0
Questions 90

Network users experience issues when accessing a server on a different network segment. An engineer investigates the issue by performing packet capture on Cisco Secure Firewall Threat Defense. The engineer expects more data and suspects that not all the traffic was collected during a 15-minute can’t captured session. Which action must the engineer take to resolve the issue?

Options:

A.  

Forward the captured data lo an FTP server

B.  

Increase the amount of RAM allocated for the capture.

C.  

Provide a file name to save the data.

D.  

Ensure that the allocated memory is sufficient.

Discussion 0
Questions 91

What is the advantage of having Cisco Firepower devices send events to Cisco Threat Response via the security services exchange portal directly as opposed to using syslog?

Options:

A.  

All types of Cisco Firepower devices are supported.

B.  

An on-premises proxy server does not need to be set up and maintained.

C.  

Cisco Firepower devices do not need to be connected to the Internet.

D.  

Supports all devices that are running supported versions of Cisco Firepower.

Discussion 0
Questions 92

What must be implemented on Cisco Firepower to allow multiple logical devices on a single physical device to have access to external hosts?

Options:

A.  

Add at least two container instances from the same module.

B.  

Set up a cluster control link between all logical devices

C.  

Add one shared management interface on all logical devices.

D.  

Define VLAN subinterfaces for each logical device.

Discussion 0
Questions 93

An engineer must create an access control policy on a Cisco Secure Firewall Threat Defense device. The company has a contact center that utilizes VoIP heavily, and it is critical that this traffic is not …. by performance issues after deploying the access control policy Which access control Action rule must be configured to handle the VoIP traffic?

Options:

A.  

monitor

B.  

trust

C.  

block

D.  

allow

Discussion 0
Questions 94

A security engineer must improve security in an organization and is producing a risk mitigation strategy to present to management for approval. Which action must the security engineer take based on this Attacks Risk Report?

Options:

A.  

Inspect DNS traffic

B.  

Block NetBIOS.

C.  

Block Internal Explorer

D.  

Inspect TCP port 80 traffic

Discussion 0
Questions 95

Refer to the exhibit. An engineer is configuring an instance of Cisco Secure Firewall Threat Defense with interfaces in IPS Inline Pair mode. What must be configured on interface e1/6 to accomplish the requirement?

Options:

A.  

propagate link state disabled

B.  

inline set MTU set to 1500

C.  

FailSafe disabled

D.  

security zone set to OUTSIDE_ZONE

Discussion 0
Questions 96

Which report template field format is available in Cisco FMC?

Options:

A.  

box lever chart

B.  

arrow chart

C.  

bar chart

D.  

benchmark chart

Discussion 0
Questions 97

The CEO ask a network administrator to present to management a dashboard that shows custom analysis tables for the top DNS queries URL category statistics, and the URL reputation statistics.

Which action must the administrator take to quickly produce this information for management?

Options:

A.  

Run the Attack report and filter on DNS to show this information.

B.  

Create a new dashboard and add three custom analysis widgets that specify the tables needed.

C.  

Modify the Connection Events dashboard to display the information in a view for management.

D.  

Copy the intrusion events dashboard tab and modify each widget to show the correct charts.

Discussion 0
Questions 98

Which action must be taken to configure an isolated bridge group for IRB mode on a Cisco Secure Firewall device?

Options:

A.  

Add the restricted segment to the ACL.

B.  

Leave BVI interface name empty.

C.  

Define the NAT pool for the blocked traffic.

D.  

Remove the route from the routing table.

Discussion 0
Questions 99

What is a feature of Cisco AMP private cloud?

Options:

A.  

It supports anonymized retrieval of threat intelligence

B.  

It supports security intelligence filtering.

C.  

It disables direct connections to the public cloud.

D.  

It performs dynamic analysis

Discussion 0
Questions 100

A network administrator must create an EtherChannel Interface on a new Cisco Firepower 9300 appliance registered with an FMC tor high availability. Where must the administrator create the EtherChannel interface?

Options:

A.  

FMC CLI

B.  

FTD CLI

C.  

FXOS CLI

D.  

FMC GUI

Discussion 0
Questions 101

An engineer is setting up a new Cisco Secure Firewall Threat Defense appliance to replace the current firewall. The company requests that inline sets be used and that when one interface in

an inline set goes down, the second interface in the inline set goes down. What must the engineer configure to meet the deployment requirements?

Options:

A.  

strict TCP enforcement

B.  

propagate link state

C.  

Snort fail open

D.  

inline tap mode

Discussion 0
Questions 102

An organization is implementing Cisco FTD using transparent mode in the network. Which rule in the default Access Control Policy ensures that this deployment does not create a loop in the network?

Options:

A.  

ARP inspection is enabled by default.

B.  

Multicast and broadcast packets are denied by default.

C.  

STP BPDU packets are allowed by default.

D.  

ARP packets are allowed by default.

Discussion 0
Questions 103

A consultant Is working on a project where the customer is upgrading from a single Cisco Firepower 2130 managed by FDM to a pair of Cisco Firepower 2130s managed oy FMC tor nigh availability. The customer wants the configures of the existing device being managed by FDM to be carried over to FMC and then replicated to the additional: device being added to create the high availability pair. Which action must the consultant take to meet this requirement?

Options:

A.  

The current FDM configuration must be configured by hand into FMC before the devices are registered.

B.  

The current FDM configuration will be converted automatically into FMC when the device registers.

C.  

The current FDM configuration must be migrated to FMC using the Secure Firewall Migration Tool.

D.  

The FTD configuration must be converted to ASA command format, which can then be migrated to FMC.

Discussion 0
Questions 104

An engineer must configure email notifications on Cisco Secure Firewall Management Center. TLS encryption must be used to protect the messages from unauthorized access. The engineer adds the IP address of the mail relay host and must set the port number. Which TCP port must the engineer use?

Options:

A.  

25

B.  

389

C.  

465

D.  

587

Discussion 0
Questions 105

Which two considerations must be made when deleting and re-adding devices while managing them via Cisco FMC (Choose two).

Options:

A.  

Before re-adding the device In Cisco FMC, the manager must be added back.

B.  

The Cisco FMC web interface prompts users to re-apply access control policies.

C.  

Once a device has been deleted, It must be reconfigured before it is re-added to the Cisco FM

C.  

D.  

An option to re-apply NAT and VPN policies during registration is available, so users do not need to re-apply the polices after registration is completed.

E.  

There is no option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the policies after registration is completed.

Discussion 0
Questions 106

An engineer is configuring a custom application detector for HTTP traffic and wants to import a file that was provided by a third party. Which type of flies are advanced application detectors creates and uploaded as?

Options:

A.  

Perl script

B.  

NBAR protocol

C.  

LUA script

D.  

Python program

Discussion 0
Questions 107

An engineer is configuring Cisco Security Devices by using Cisco Secure Firewall Management Center. Which configuration command must be run to compare the CA certificate bundle on the local system to the latest CA bundle from the Cisco server?

Options:

A.  

configure cert-update compare

B.  

configure cert-update auto-update enable

C.  

configure cert-update run-now

D.  

configure cert-update test

Discussion 0
Questions 108

An administrator is attempting to add a Cisco Secure Firewall Threat Defence device to Cisco Secure Firewall Management Center with a password of Cisco0480846211 480846211. The private IP address of the FMC server is 192.168.75.201. Which command must be used in order to accomplish this task?

Options:

A.  

configure manager add 192.168.75.201/24

B.  

configure manager add 192.16875.201

C.  

configure manager add 192.168.45.45

D.  

configure manager add 192.168.75.201 255.255.255.0

Discussion 0
Questions 109

What is the advantage of having Cisco Firepower devices send events to Cisco Threat response via the security services exchange portal directly as opposed to using syslog?

Options:

A.  

Firepower devices do not need to be connected to the internet.

B.  

All types of Firepower devices are supported.

C.  

Supports all devices that are running supported versions of Firepower

D.  

An on-premises proxy server does not need to set up and maintained

Discussion 0
Questions 110

Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)

Options:

A.  

Redundant Interface

B.  

EtherChannel

C.  

Speed

D.  

Media Type

E.  

Duplex

Discussion 0
Questions 111

A security engineer must configure policies tor a recently deployed Cisco FTD. The security policy for the company dictates that when five or more connections from external sources are initiated within 2 minutes, there is cause for concern. Which type of policy must be configured in Cisco FMC \z generate an alert when this condition is triggered?

Options:

A.  

application detector

B.  

access control

C.  

intrusion

D.  

correlation

Discussion 0
Questions 112

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

Options:

A.  

Traffic inspection can be interrupted temporarily when configuration changes are deployed.

B.  

The system performs intrusion inspection followed by file inspection.

C.  

They can block traffic based on Security Intelligence data.

D.  

File policies use an associated variable set to perform intrusion prevention.

E.  

The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.

Discussion 0
Questions 113

How many report templates does the Cisco Firepower Management Center support?

Options:

A.  

20

B.  

10

C.  

5

D.  

unlimited

Discussion 0
Questions 114

Refer to the exhibit. A security engineer views the health alerts in Cisco Secure Firewall Management Center by using the Health Monitor in the web interface. One of the alerts shows an appliance as critical because the Time Synchronization module status is out of sync. To troubleshoot the issue, the engineer runs the ntpq command in Secure Firewall Management Center. The output is shown in the exhibit. Which action must the security engineer take next to resolve the issue?

Options:

A.  

Reset the appliance with a hard reboot.

B.  

Reestablish the connection to the timeserver.

C.  

Configure the appliance to receive the time from an NTP server.

D.  

Configure the appliance to sync with its own internal clock.

Discussion 0
Questions 115

An organization has a Cisco FTD that uses bridge groups to pass traffic from the inside interfaces to the outside interfaces. They are unable to gather information about neighbouring Cisco devices or use multicast in their environment. What must be done to resolve this issue?

Options:

A.  

Create a firewall rule to allow CDP traffic.

B.  

Create a bridge group with the firewall interfaces.

C.  

Change the firewall mode to transparent.

D.  

Change the firewall mode to routed.

Discussion 0