Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Securing Networks with Cisco Firepower (300-710 SNCF) Question and Answers

Securing Networks with Cisco Firepower (300-710 SNCF)

Last Update Oct 2, 2025
Total Questions : 376

We are offering FREE 300-710 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-710 free exam questions and then go for complete pool of Securing Networks with Cisco Firepower (300-710 SNCF) test questions that will help you more.

300-710 pdf

300-710 PDF

$46  $114.99
300-710 Engine

300-710 Testing Engine

$54  $134.99
300-710 PDF + Engine

300-710 PDF + Testing Engine

$70  $174.99
Questions 1

A Cisco FMC administrator wants to configure fastpathing of trusted network traffic to increase performance. In which type of policy would the administrator configure this feature?

Options:

A.  

Identity policy

B.  

Prefilter policy

C.  

Network Analysis policy

D.  

Intrusion policy

Discussion 0
Questions 2

An administrator must fix a network problem whereby traffic from the inside network to a webserver is not getting through an instance of Cisco Secure Firewall Threat Defense. Which command must the administrator use to capture packets to the webserver that are dropped by Secure Firewall Throat Defense and resold the issue?

Options:

A.  

capture CAP int OUTSIDE match ip any host WEBSERVERIP

B.  

capture CAP type asp-drop all headers-only

C.  

capture CAP int INSIDE match ip any host WEBSERVERIP

D.  

capture CAP int INSIDE match tcp any 80 host WEBSERVERlP 80

Discussion 0
Questions 3

Which Cisco Firepower rule action displays an HTTP warning page?

Options:

A.  

Monitor

B.  

Block

C.  

Interactive Block

D.  

Allow with Warning

Discussion 0
Questions 4

Which Firepower feature allows users to configure bridges in routed mode and enables devices to perform Layer 2 switching between interfaces?

Options:

A.  

FlexConfig

B.  

BDI

C.  

SGT

D.  

IRB

Discussion 0
Questions 5

An administrator is creating interface objects to better segment their network but is having trouble adding interfaces to the objects. What is the reason for this failure?

Options:

A.  

The interfaces are being used for NAT for multiple networks.

B.  

The administrator is adding interfaces of multiple types.

C.  

The administrator is adding an interface that is in multiple zones.

D.  

The interfaces belong to multiple interface groups.

Discussion 0
Questions 6

Which object type supports object overrides?

Options:

A.  

time range

B.  

security group tag

C.  

network object

D.  

DNS server group

Discussion 0
Questions 7

Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?

Options:

A.  

configure manager local 10.0.0.10 Cisco123

B.  

configure manager add Cisco123 10.0.0.10

C.  

configure manager local Cisco123 10.0.0.10

D.  

configure manager add 10.0.0.10 Cisco123

Discussion 0
Questions 8

A company is in the process of deploying intrusion prevention with Cisco FTDs managed by a Cisco FMC. An engineer must configure policies to detect potential intrusions but not block the suspicious traffic. Which action accomplishes this task?

Options:

A.  

Configure IDS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by unchecking the "Drop when inline" option.

B.  

Configure IPS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by checking the "Drop when inline" option.

C.  

Configure IPS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by unchecking the "Drop when inline" option.

D.  

Configure IDS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by checking the "Drop when inline" option.

Discussion 0
Questions 9

A security analyst must create a new report within Cisco FMC to show an overview of the daily attacks, vulnerabilities, and connections. The analyst wants to reuse specific dashboards from other reports to create this consolidated one. Which action accomplishes this task?

Options:

A.  

Create a new dashboard object via Object Management to represent the desired views.

B.  

Modify the Custom Workflows within the Cisco FMC to feed the desired data into the new report.

C.  

Copy the Malware Report and modify the sections to pull components from other reports.

D.  

Use the import feature in the newly created report to select which dashboards to add.

Discussion 0
Questions 10

An engineer is working on a LAN switch and has noticed that its network connection to the mime Cisco IPS has gone down Upon troubleshooting it is determined that the switch is working as expected What must have been implemented for this failure to occur?

Options:

A.  

The upstream router has a misconfigured routing protocol

B.  

Link-state propagation is enabled

C.  

The Cisco IPS has been configured to be in fail-open mode

D.  

The Cisco IPS is configured in detection mode

Discussion 0
Questions 11

Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)

Options:

A.  

BGPv6

B.  

ECMP with up to three equal cost paths across multiple interfaces

C.  

ECMP with up to three equal cost paths across a single interface

D.  

BGPv4 in transparent firewall mode

E.  

BGPv4 with nonstop forwarding

Discussion 0
Questions 12

What is the result of specifying of QoS rule that has a rate limit that is greater than the maximum throughput of an interface?

Options:

A.  

The rate-limiting rule is disabled.

B.  

Matching traffic is not rate limited.

C.  

The system rate-limits all traffic.

D.  

The system repeatedly generates warnings.

Discussion 0
Questions 13

Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)

Options:

A.  

dynamic key mapping objects that help link HTTP and HTTPS GET requests to Layer 7 application protocols.

B.  

reputation-based objects that represent Security Intelligence feeds and lists, application filters based on category and reputation, and file lists

C.  

network-based objects that represent IP address and networks, port/protocols pairs, VLAN tags, security zones, and origin/destination country

D.  

network-based objects that represent FQDN mappings and networks, port/protocol pairs, VXLAN tags, security zones and origin/destination country

E.  

reputation-based objects, such as URL categories

Discussion 0
Questions 14

In which two places can thresholding settings be configured? (Choose two.)

Options:

A.  

on each IPS rule

B.  

globally, within the network analysis policy

C.  

globally, per intrusion policy

D.  

on each access control rule

E.  

per preprocessor, within the network analysis policy

Discussion 0
Questions 15

A network administrator reviews the file report for the last month and notices that all file types, except exe. show a disposition of unknown. What is the cause of this issue?

Options:

A.  

The malware license has not been applied to the Cisco FTD.

B.  

The Cisco FMC cannot reach the Internet to analyze files.

C.  

A file policy has not been applied to the access policy.

D.  

Only Spero file analysis is enabled.

Discussion 0
Questions 16

Which two actions can be used in an access control policy rule? (Choose two.)

Options:

A.  

Block with Reset

B.  

Monitor

C.  

Analyze

D.  

Discover

E.  

Block ALL

Discussion 0
Questions 17

An organization does not want to use the default Cisco Firepower block page when blocking HTTP traffic. The organization wants to include information about its policies and procedures to help educate the users whenever a block occurs. Which two steps must be taken to meet these requirements? (Choose two.)

Options:

A.  

Modify the system-provided block page result using Python.

B.  

Create HTML code with the information for the policies and procedures.

C.  

Edit the HTTP request handling in the access control policy to customized block.

D.  

Write CSS code with the information for the policies and procedures.

E.  

Change the HTTP response in the access control policy to custom.

Discussion 0
Questions 18

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

Options:

A.  

Traffic inspection can be interrupted temporarily when configuration changes are deployed.

B.  

The system performs intrusion inspection followed by file inspection.

C.  

They can block traffic based on Security Intelligence data.

D.  

File policies use an associated variable set to perform intrusion prevention.

E.  

The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.

Discussion 0
Questions 19

A network administrator notices that remote access VPN users are not reachable from inside the network. It is determined that routing is configured correctly, however return traffic is entering the firewall but not leaving it What is the reason for this issue?

Options:

A.  

A manual NAT exemption rule does not exist at the top of the NAT table.

B.  

An external NAT IP address is not configured.

C.  

An external NAT IP address is configured to match the wrong interface.

D.  

An object NAT exemption rule does not exist at the top of the NAT table.

Discussion 0
Questions 20

An engineer configures a network discovery policy on Cisco FMC. Upon configuration, it is noticed that excessive and misleading events filing the database and overloading the Cisco FMC. A monitored NAT device is executing multiple updates of its operating system in a short period of time. What configurationchange must be made to alleviate this issue?

Options:

A.  

Leave default networks.

B.  

Change the method to TCP/SYN.

C.  

Increase the number of entries on the NAT device.

D.  

Exclude load balancers and NAT devices.

Discussion 0
Questions 21

Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)

Options:

A.  

The BVI IP address must be in a separate subnet from the connected network.

B.  

Bridge groups are supported in both transparent and routed firewall modes.

C.  

Bridge groups are supported only in transparent firewall mode.

D.  

Bidirectional Forwarding Detection echo packets are allowed through the FTD when using bridge-group members.

E.  

Each directly connected network must be on the same subnet.

Discussion 0
Questions 22

Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choosetwo.)

Options:

A.  

OSPFv2 with IPv6 capabilities

B.  

virtual links

C.  

SHA authentication to OSPF packets

D.  

area boundary router type 1 LSA filtering

E.  

MD5 authentication to OSPF packets

Discussion 0
Questions 23

Which CLI command is used to control special handling of ClientHello messages?

Options:

A.  

system support ssl-client-hello-tuning

B.  

system support ssl-client-hello-display

C.  

system support ssl-client-hello-force-reset

D.  

system support ssl-client-hello-enabled

Discussion 0
Questions 24

Which CLI command is used to generate firewall debug messages on a Cisco Firepower?

Options:

A.  

system support firewall-engine-debug

B.  

system support ssl-debug

C.  

system support platform

D.  

system support dump-table

Discussion 0
Questions 25

A network administrator wants to block traffictoa known malware site athttps://www.badsite.com and all subdomains while ensuring no packets from any internal client are sent to that site. Which type of policy must the network administrator use to accomplish this goal?

Options:

A.  

Prefilter policy

B.  

SSL policy

C.  

DNS policy

D.  

Access Control policy with URL filtering

Discussion 0
Questions 26

A network administrator is deploying a Cisco IPS appliance and needs it to operate initially without affecting traffic flows.

It must also collect data to provide a baseline of unwanted traffic before being reconfigured to drop it. Which Cisco IPS mode meets these requirements?

Options:

A.  

failsafe

B.  

inline tap

C.  

promiscuous

D.  

bypass

Discussion 0
Questions 27

The CEO ask a network administrator to present to management a dashboard that shows custom analysis tables for the top DNS queries URL category statistics, and the URL reputation statistics.

Which action must the administrator take to quickly produce this information for management?

Options:

A.  

Run the Attack report and filter on DNS to show this information.

B.  

Create a new dashboard and add three custom analysis widgets that specify the tables needed.

C.  

Modify the Connection Events dashboard to display the information in a view for management.

D.  

Copy the intrusion events dashboard tab and modify each widget to show the correct charts.

Discussion 0
Questions 28

Which two remediation options are available when Cisco FMC is integrated with Cisco ISE? (Choose two.)

Options:

A.  

dynamic null route configured

B.  

DHCP pool disablement

C.  

quarantine

D.  

port shutdown

E.  

host shutdown

Discussion 0
Questions 29

Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?

Options:

A.  

Add the malicious file to the block list.

B.  

Send a snapshot to Cisco for technical support.

C.  

Forward the result of the investigation to an external threat-analysis engine.

D.  

Wait for Cisco Threat Response to automatically block the malware.

Discussion 0
Questions 30

What is a valid Cisco AMP file disposition?

Options:

A.  

non-malicious

B.  

malware

C.  

known-good

D.  

pristine

Discussion 0
Questions 31

What is the maximum SHA level of filtering that Threat Intelligence Director supports?

Options:

A.  

SHA-1024

B.  

SHA-4096

C.  

SHA-512

D.  

SHA-256

Discussion 0
Questions 32

In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot be reached?

Options:

A.  

unavailable

B.  

unknown

C.  

clean

D.  

disconnected

Discussion 0
Questions 33

Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat Containment?

Options:

A.  

pxGrid

B.  

FTD RTC

C.  

FMC RTC

D.  

ISEGrid

Discussion 0
Questions 34

Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)

Options:

A.  

application blocking

B.  

simple custom detection

C.  

file repository

D.  

exclusions

E.  

application whitelisting

Discussion 0
Questions 35

Which command should be used on the Cisco FTD CLI to capture all the packets that hit an interface?

Options:

A.  

configure coredump packet-engine enable

B.  

capture-traffic

C.  

capture

D.  

capture WORD

Discussion 0
Questions 36

When do you need the file-size command option during troubleshooting with packet capture?

Options:

A.  

when capture packets are less than 16 MB

B.  

when capture packets are restricted from the secondary memory

C.  

when capture packets exceed 10 GB

D.  

when capture packets exceed 32 MB

Discussion 0
Questions 37

Which group within Cisco does the Threat Response team use for threat analysis and research?

Options:

A.  

Cisco Deep Analytics

B.  

OpenDNS Group

C.  

Cisco Network Response

D.  

Cisco Talos

Discussion 0
Questions 38

Which two packet captures does the FTD LINA engine support? (Choose two.)

Options:

A.  

Layer 7 network ID

B.  

source IP

C.  

application ID

D.  

dynamic firewall importing

E.  

protocol

Discussion 0
Questions 39

Which command-line mode is supported from the Cisco Firepower Management Center CLI?

Options:

A.  

privileged

B.  

user

C.  

configuration

D.  

admin

Discussion 0
Questions 40

How many report templates does the Cisco Firepower Management Center support?

Options:

A.  

20

B.  

10

C.  

5

D.  

unlimited

Discussion 0
Questions 41

What is a behavior of a Cisco FMC database purge?

Options:

A.  

User login and history data are removed from the database if the User Activity check box is selected.

B.  

Data can be recovered from the device.

C.  

The appropriate process is restarted.

D.  

The specified data is removed from Cisco FMC and kept for two weeks.

Discussion 0
Questions 42

Which report template field format is available in Cisco FMC?

Options:

A.  

box lever chart

B.  

arrow chart

C.  

bar chart

D.  

benchmark chart

Discussion 0
Questions 43

Which command is entered in the Cisco FMC CLI to generate a troubleshooting file?

Options:

A.  

show running-config

B.  

show tech-support chassis

C.  

system support diagnostic-cli

D.  

sudo sf_troubleshoot.pl

Discussion 0
Questions 44

Within Cisco Firepower Management Center, where does a user add or modify widgets?

Options:

A.  

dashboard

B.  

reporting

C.  

context explorer

D.  

summary tool

Discussion 0
Questions 45

Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)

Options:

A.  

An option to re-apply NAT and VPN policies during registration is available, so users do not need to re- apply the policies after registration is completed.

B.  

Before re-adding the device in Cisco FMC, you must add the manager back in the device.

C.  

No option to delete and re-add a device is available in the Cisco FMC web interface.

D.  

The Cisco FMC web interface prompts users to re-apply access control policies.

E.  

No option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the policies after registration is completed.

Discussion 0
Questions 46

Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?

Options:

A.  

Child domains can view but not edit dashboards that originate from an ancestor domain.

B.  

Child domains have access to only a limited set of widgets from ancestor domains.

C.  

Only the administrator of the top ancestor domain can view dashboards.

D.  

Child domains cannot view dashboards that originate from an ancestor domain.

Discussion 0
Questions 47

Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?

Options:

A.  

Windows domain controller

B.  

audit

C.  

triage

D.  

protection

Discussion 0
Questions 48

A company has many Cisco FTD devices managed by a Cisco FMC. The security model requires that access control rule logs be collected for analysis. The security engineer is concerned that the Cisco FMC will not be able to process the volume of logging that will be generated. Which configuration addresses this concern?

Options:

A.  

Send Cisco FTD connection events and security events directly to SIEM system for storage and analysis.

B.  

Send Cisco FTD connection events and security events to a cluster of Cisco FMC devices for storage and analysis.

C.  

Send Cisco FTD connection events and security events to Cisco FMC and configure it to forward logs to SIEM for storage and analysis.

D.  

Send Cisco FTD connection events directly to a SIEM system and forward security events from Cisco FMC to the SIEM system for storage and analysis.

Discussion 0
Questions 49

An engineer wants to connect a single IP subnet through a Cisco FTD firewall and enforce policy. There is a requirement to present the internal IP subnet to the outside as a different IP address. What must be configured to meet these requirements?

Options:

A.  

Configure the downstream router to perform NAT.

B.  

Configure the upstream router to perform NAT.

C.  

Configure the Cisco FTD firewall in routed mode with NAT enabled.

D.  

Configure the Cisco FTD firewall in transparent mode with NAT enabled.

Discussion 0
Questions 50

An administrator Is setting up a Cisco PMC and must provide expert mode access for a security engineer. The engineer Is permitted to use only a secured out-of-band network workstation with a static IP address to access the Cisco FMC. What must be configured to enable this access?

Options:

A.  

Enable SSH and define an access list.

B.  

Enable HTTP and define an access list.

C.  

Enable SCP under the Access List section.

D.  

Enable HTTPS and SNMP under the Access List section.

Discussion 0
Questions 51

An engineer must integrate a third-party security intelligence feed with Cisco Secure Firewall Management Center. Secure Firewall Management Center is running Version 6.2.3 and has 8

GB of memory. Which two actions must be taken to implement Threat Intelligence Director? (Choose two.)

Options:

A.  

Enable REST API access.

B.  

Add a TAXII server.

C.  

Add the URL of the TAXII server.

D.  

Upgrade to version 6.6.

E.  

Add 7 GB of memory.

Discussion 0
Questions 52

What is a limitation to consider when running a dynamic routing protocol on a Cisco FTD device in IRB mode?

Options:

A.  

Only link-stale routing protocols are supported.

B.  

Only distance vector routing protocols are supported.

C.  

Only EtherChannel interfaces are supposed.

D.  

Only nonbridge interfaces are supported.

Discussion 0
Questions 53

An engineer must configure high availability on two Cisco Secure Firewall Threat Defense appliances. Drag and drop the configuration steps from the left into the sequence on the right.

Options:

Discussion 0
Questions 54

Cisco Security Analytics and Logging SaaS licenses come with how many days of data retention by default?

Options:

A.  

60

B.  

365

C.  

90

D.  

120

Discussion 0
Questions 55

An engineer is troubleshooting a device that cannot connect to a web server. The connection is initiated from the Cisco FTD inside interface and attempting to reach 10.0.1.100 over the non-standard port of 9443 The host the engineer is attempting the connection from is at the IP address of 10.20.10.20. In order to determine what is happening to the packets on the network, the engineer decides to use the FTD packet capture tool Which capture configuration should be used to gather the information needed to troubleshoot this issue?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 56

An administrator is configuring the interface of a Cisco Secure Firewall Threat Defense device in a passive IPS deployment. The device and interface have been identified. Which set of configuration steps of the administrator take next to complete the implementation?

Options:

A.  

Set the interface mode to passive. Associate the interface with a security zone. Set the MTU parameter. Reset the interface.

B.  

Modify the interface to retransmit received traffic. Associate the interface with a security zone Enable the interface. Sat the MTU parameter.

C.  

Modify the interface to retransmit received traffic. Associate the interface with a security zone. Set the MTU parameter.

D.  

Set the interface mode to passive. Associate the interface with a security zone. Enable the interface. Set the MTU parameter.

Discussion 0
Questions 57

What is a functionality of port objects in Cisco FMC?

Options:

A.  

to mix transport protocols when setting both source and destination port conditions in a rule

B.  

to represent protocols other than TCP, UDP, and ICMP

C.  

to represent all protocols in the same way

D.  

to add any protocol other than TCP or UDP for source port conditions in access control rules.

Discussion 0
Questions 58

What is the benefit of selecting the trace option for packet capture?

Options:

A.  

The option indicates whether the packet was dropped or successful.

B.  

The option indicated whether the destination host responds through a different path.

C.  

The option limits the number of packets that are captured.

D.  

The option captures details of each packet.

Discussion 0
Questions 59

Which command must be run to generate troubleshooting files on an FTD?

Options:

A.  

system support view-files

B.  

sudo sf_troubleshoot.pl

C.  

system generate-troubleshoot all

D.  

show tech-support

Discussion 0
Questions 60

Which Cisco Firepower feature is used to reduce the number of events received in a period of time?

Options:

A.  

rate-limiting

B.  

suspending

C.  

correlation

D.  

thresholding

Discussion 0
Questions 61

A network engineer is configuring URL Filtering on Firepower Threat Defense. Which two port requirements on the Firepower Management Center must be validated to allow communication with the cloud service? (Choose two.)

Options:

A.  

outbound port TCP/443

B.  

inbound port TCP/80

C.  

outbound port TCP/8080

D.  

inbound port TCP/443

E.  

outbound port TCP/80

Discussion 0
Questions 62

After deploying a network-monitoring tool to manage and monitor networking devices in your organization, you realize that you need to manually upload an MIB for the Cisco FMC. In which folder should you upload the MIB file?

Options:

A.  

/etc/sf/DCMIB.ALERT

B.  

/sf/etc/DCEALERT.MIB

C.  

/etc/sf/DCEALERT.MIB

D.  

system/etc/DCEALERT.MIB

Discussion 0
Questions 63

Which action should be taken after editing an object that is used inside an access control policy?

Options:

A.  

Delete the existing object in use.

B.  

Refresh the Cisco FMC GUI for the access control policy.

C.  

Redeploy the updated configuration.

D.  

Create another rule using a different object name.

Discussion 0
Questions 64

Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC from the left into the correct order on the right. Not all options are used.

Options:

Discussion 0
Questions 65

What is the maximum bit size that Cisco FMC supports for HTTPS certificates?

Options:

A.  

1024

B.  

8192

C.  

4096

D.  

2048

Discussion 0
Questions 66

What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?

Options:

A.  

VPN connections can be re-established only if the failed master unit recovers.

B.  

Smart License is required to maintain VPN connections simultaneously across all cluster units.

C.  

VPN connections must be re-established when a new master unit is elected.

D.  

Only established VPN connections are maintained when a new master unit is elected.

Discussion 0
Questions 67

An engineer is using the configure manager add Cisc402098527 command to add a new Cisco FTD device to the Cisco FMC; however, the device is not being added. Why Is this occurring?

Options:

A.  

The NAT ID is required since the Cisco FMC is behind a NAT device.

B.  

The IP address used should be that of the Cisco FTD. not the Cisco FMC.

C.  

DONOTRESOLVE must be added to the command

D.  

The registration key is missing from the command

Discussion 0
Questions 68

An engineer is configuring Cisco FMC and wants to allow multiple physical interfaces to be part of the same VLAN. The managed devices must be able to perform Layer 2 switching between interfaces, including sub-interfaces. What must be configured to meet these requirements?

Options:

A.  

interface-based VLAN switching

B.  

inter-chassis clustering VLAN

C.  

integrated routing and bridging

D.  

Cisco ISE Security Group Tag

Discussion 0
Questions 69

An organization is using a Cisco FTD and Cisco ISE to perform identity-based access controls. A network administrator is analyzing the Cisco FTD events and notices that unknown user traffic is being allowed through the firewall. How should this be addressed to block the traffic while allowing legitimate user traffic?

Options:

A.  

Modify the Cisco ISE authorization policy to deny this access to the user.

B.  

Modify Cisco ISE to send only legitimate usernames to the Cisco FTD.

C.  

Add the unknown user in the Access Control Policy in Cisco FTD.

D.  

Add the unknown user in the Malware & File Policy in Cisco FT

D.  

Discussion 0
Questions 70

An organization has a Cisco FTD that uses bridge groups to pass traffic from the inside interfaces to the outside interfaces. They are unable to gather information about neighbouring Cisco devices or use multicast in their environment. What must be done to resolve this issue?

Options:

A.  

Create a firewall rule to allow CDP traffic.

B.  

Create a bridge group with the firewall interfaces.

C.  

Change the firewall mode to transparent.

D.  

Change the firewall mode to routed.

Discussion 0
Questions 71

An engineer is configuring a Cisco IPS to protect the network and wants to test a policy before deploying it. A copy of each incoming packet needs to be monitored while traffic flow remains constant. Which IPS mode should be implemented to meet these requirements?

Options:

A.  

Inline tap

B.  

passive

C.  

transparent

D.  

routed

Discussion 0
Questions 72

Which two conditions must be met to enable high availability between two Cisco FTD devices? (Choose two.)

Options:

A.  

same flash memory size

B.  

same NTP configuration

C.  

same DHCP/PPoE configuration

D.  

same host name

E.  

same number of interfaces

Discussion 0
Questions 73

On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?

Options:

A.  

transparent inline mode

B.  

TAP mode

C.  

strict TCP enforcement

D.  

propagate link state

Discussion 0
Questions 74

Which interface type allows packets to be dropped?

Options:

A.  

passive

B.  

inline

C.  

ERSPAN

D.  

TAP

Discussion 0
Questions 75

An engineer is tasked with deploying an internal perimeter firewall that will support multiple DMZs Each DMZ has a unique private IP subnet range. How is this requirement satisfied?

Options:

A.  

Deploy the firewall in transparent mode with access control policies.

B.  

Deploy the firewall in routed mode with access control policies.

C.  

Deploy the firewall in routed mode with NAT configured.

D.  

Deploy the firewall in transparent mode with NAT configured.

Discussion 0
Questions 76

Within an organization's high availability environment where both firewalls are passing traffic, traffic must be segmented based on which department it is destined for. Each department is situated on a different LAN. What must be configured to meet these requirements?

Options:

A.  

span EtherChannel clustering

B.  

redundant interfaces

C.  

high availability active/standby firewalls

D.  

multi-instance firewalls

Discussion 0
Questions 77

Which two deployment types support high availability? (Choose two.)

Options:

A.  

transparent

B.  

routed

C.  

clustered

D.  

intra-chassis multi-instance

E.  

virtual appliance in public cloud

Discussion 0
Questions 78

What is the difference between inline and inline tap on Cisco Firepower?

Options:

A.  

Inline tap mode can send a copy of the traffic to another device.

B.  

Inline tap mode does full packet capture.

C.  

Inline mode cannot do SSL decryption.

D.  

Inline mode can drop malicious traffic.

Discussion 0
Questions 79

Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)

Options:

A.  

Redundant Interface

B.  

EtherChannel

C.  

Speed

D.  

Media Type

E.  

Duplex

Discussion 0
Questions 80

A network engineer implements a new Cisco Firepower device on the network to take advantage of its intrusion detection functionality. There is a requirement to analyze the traffic going across the device, alert on any malicious traffic, and appear as a bump in the wire How should this be implemented?

Options:

A.  

Specify the BVl IP address as the default gateway for connected devices.

B.  

Enable routing on the Cisco Firepower

C.  

Add an IP address to the physical Cisco Firepower interfaces.

D.  

Configure a bridge group in transparent mode.

Discussion 0
Questions 81

An engineer must configure high availability for the Cisco Firepower devices. The current network topology does not allow for two devices to pass traffic concurrently. How must the devices be implemented in this environment?

Options:

A.  

in active/active mode

B.  

in a cluster span EtherChannel

C.  

in active/passive mode

D.  

in cluster interface mode

Discussion 0
Questions 82

A Cisco FTD has two physical interfaces assigned to a BVI. Each interface is connected to a different VLAN on the same switch. Which firewall mode is the Cisco FTD set up to support?

Options:

A.  

active/active failover

B.  

transparent

C.  

routed

D.  

high availability clustering

Discussion 0
Questions 83

An engineer is building a new access control policy using Cisco FMC. The policy must inspect a unique IPS policy as well as log rule matching. Which action must be taken to meet these requirements?

Options:

A.  

Configure an IPS policy and enable per-rule logging.

B.  

Disable the default IPS policy and enable global logging.

C.  

Configure an IPS policy and enable global logging.

D.  

Disable the default IPS policy and enable per-rule logging.

Discussion 0
Questions 84

Which firewall design allows a firewall to forward traffic at layer 2 and layer 3 for the same subnet?

Options:

A.  

Cisco Firepower Threat Defense mode

B.  

transparent mode

C.  

routed mode

D.  

integrated routing and bridging

Discussion 0
Questions 85

A network security engineer must replace a faulty Cisco FTD device in a high availability pair. Which action must be taken while replacing the faulty unit?

Options:

A.  

Shut down the Cisco FMC before powering up the replacement unit.

B.  

Ensure that the faulty Cisco FTD device remains registered to the Cisco FMC.

C.  

Unregister the faulty Cisco FTD device from the Cisco FMC

D.  

Shut down the active Cisco FTD device before powering up the replacement unit.

Discussion 0
Questions 86

Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)

Options:

A.  

The units must be the same version

B.  

Both devices can be part of a different group that must be in the same domain when configured within the FMC.

C.  

The units must be different models if they are part of the same series.

D.  

The units must be configured only for firewall routed mode.

E.  

The units must be the same model.

Discussion 0
Questions 87

Which policy rule is included in the deployment of a local DMZ during the initial deployment of a Cisco NGFW through the Cisco FMC GUI?

Options:

A.  

a default DMZ policy for which only a user can change the IP addresses.

B.  

deny ip any

C.  

no policy rule is included

D.  

permit ip any

Discussion 0
Questions 88

What are the minimum requirements to deploy a managed device inline?

Options:

A.  

inline interfaces, security zones, MTU, and mode

B.  

passive interface, MTU, and mode

C.  

inline interfaces, MTU, and mode

D.  

passive interface, security zone, MTU, and mode

Discussion 0
Questions 89

What is a result of enabling Cisco FTD clustering?

Options:

A.  

For the dynamic routing feature, if the master unit fails, the newly elected master unit maintains all existing connections.

B.  

Integrated Routing and Bridging is supported on the master unit.

C.  

Site-to-site VPN functionality is limited to the master unit, and all VPN connections are dropped if the master unit fails.

D.  

All Firepower appliances can support Cisco FTD clustering.

Discussion 0
Questions 90

Which protocol establishes network redundancy in a switched Firepower device deployment?

Options:

A.  

STP

B.  

HSRP

C.  

GLBP

D.  

VRRP

Discussion 0
Questions 91

What are two application layer preprocessors? (Choose two.)

Options:

A.  

CIFS

B.  

IMAP

C.  

SSL

D.  

DNP3

E.  

ICMP

Discussion 0
Questions 92

An administrator is optimizing the Cisco FTD rules to improve network performance, and wants to bypass inspection for certain traffic types to reduce the load on the Cisco FTD. Which policy must be configured to accomplish this goal?

Options:

A.  

prefilter

B.  

intrusion

C.  

identity

D.  

URL filtering

Discussion 0