Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
300-710
Free trial
Verified
Question 51
A network engineer is extending a user segment through an FTD device for traffic inspection without creating another IP subnet. How is this accomplished on an
FTD device in routed mode?
- A: by assigning an inline set interface
- B: by using a BVI and creating a BVI IP address in the same subnet as the user segment
- C: by leveraging the ARP to direct traffic through the firewall
- D: by bypassing protocol inspection by leveraging pre-filter rules
Question 52
A network administrator cannot select the link to be used for failover when configuring an active/passive HA Cisco FTD pair. Which configuration must be changed before setting up the high availability pair?
- A: An IP address in the same subnet must be added to each Cisco FTD on the interface.
- B: The interface name must be removed from the interface on each Cisco FTD.
- C: The name Failover must be configured manually on the interface on each Cisco FTD.
- D: The interface must be configured as part of a LACP Active/Active EtherChannel.
Question 53
Which firewall design will allow it to forward traffic at layers 2 and 3 for the same subnet?
- A: routed mode
- B: Cisco Firepower Threat Defense mode
- C: transparent mode
- D: integrated routing and bridging
Question 54
An organization is configuring a new Cisco Firepower High Availability deployment. Which action must be taken to ensure that failover is as seamless as possible to end users?
- A: Set the same FQDN for both chassis.
- B: Set up a virtual failover MAC address between chassis.
- C: Load the same software version on both chassis.
- D: Use a dedicated stateful link between chassis.
Question 55
A company is in the process of deploying intrusion prevention with Cisco FTDs managed by a Cisco FMC. An engineer must configure policies to detect potential intrusions but not block the suspicious traffic. Which action accomplishes this task?
- A: Configure IPS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by checking the “Drop when inline” option.
- B: Configure IPS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by unchecking the “Drop when inline” option.
- C: Configure IDS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by checking the “Drop when inline” option.
- D: Configure IDS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by unchecking the “Drop when inline” option.
Question 56
An engineer is using the configure manager add Cisc404225383 command to add a new Cisco FTD device to the Cisco FMC; however, the device is not being added. Why is this occurring?
- A: DONOTRESOLVE must be added to the command
- B: The IP address used should be that of the Cisco FTD, not the Cisco FMC
- C: The registration key is missing from the command
- D: The NAT ID is required since the Cisco FMC is behind a NAT device
Question 57
An organization does not want to use the default Cisco Firepower block page when blocking HTTP traffic. The organization wants to include information about its policies and procedures to help educate the users whenever a block occurs. Which two steps must be taken to meet these requirements? (Choose two.)
- A: Edit the HTTP request handling in the access control policy to customized block
- B: Modify the system-provided block page result using Python
- C: Create HTML code with the information for the policies and procedures
- D: Change the HTTP response in the access control policy to custom
- E: Write CSS code with the information for the policies and procedures
Question 58
A company has many Cisco FTD devices managed by a Cisco FMC. The security model requires that access control rule logs be collected for analysis. The security engineer is concerned that the Cisco FMC will not be able to process the volume of logging that will be generated. Which configuration addresses concern this?
- A: Send Cisco FTD connection events directly to a SIEM system and forward security events from Cisco FMC to the SIEM system for storage and analysis
- B: Send Cisco FTD connection events and security events directly to SIEM system for storage and analysis
- C: Send Cisco FTD connection events and security events to a cluster of Cisco FMC devices for storage and analysis
- D: Send Cisco FTD connection events and security events to Cisco FMC and configure it to forward logs to SIEM for storage and analysis
Question 59
A network administrator reviews the file report for the last month and notices that all file types, except exe, show a disposition of unknown. What is the cause of this issue?
- A: Only Spero file analysis is enabled.
- B: The Cisco FMC cannot reach the Internet to analyze files.
- C: A file policy has not been applied to the access policy.
- D: The malware license has not been applied to the Cisco FTD.
Question 60
An engineer is configuring a Cisco FTD appliance in IPS-only mode and needs to utilize fail-to-wire interfaces. Which interface mode should be used to meet these requirements?
- A: passive
- B: routed
- C: transparent
- D: inline set
Question 61
An engineer wants to connect a single IP subnet through a Cisco FTD firewall and enforce policy. There is a requirement to present the internal IP subnet to the outside as a different IP address. What must be configured to meet these requirements?
- A: Configure the Cisco FTD firewall in routed mode with NAT enabled.
- B: Configure the upstream router to perform NAT.
- C: Configure the Cisco FTD firewall in transparent mode with NAT enabled.
- D: Configure the downstream router to perform NAT.
Question 62
A security engineer is configuring a remote Cisco FTD that has limited resources and internet bandwidth. Which malware action and protection option should be configured to reduce the requirement for cloud lookups?
- A: Block File action and local malware analysis
- B: Malware Cloud Lookup and dynamic analysis
- C: Block Malware action and dynamic analysis
- D: Block Malware action and local malware analysis
Question 63
An administrator must use Cisco FMC to install a backup route within the Cisco FTD to route traffic in case of a routing failure with primary route. Which action accomplish this task?
- A: Install the static backup route and modify the metric to be less than the primary route
- B: Use a default route in the FMC instead of having multiple routes contending for priority
- C: Configure EIGRP routing on the FMC to ensure that dynamic routes are always updated
- D: Create the backup route and use route tracking on both routes to a destination IP address in the network
Question 64
An administrator is adding a new URL-based category feed to the Cisco FMC for use within the policies. The intelligence source does not use STIX, but instead uses a .txt file format. Which action ensures that regular updates are provided?
- A: Add a URL source and select the flat file type within Cisco FMC.
- B: Add a TAXII feed source and input the URL for the feed.
- C: Upload the .txt file and configure automatic updates using the embedded URL.
- D: Convert the .txt file to STIX and upload it to the Cisco FMC.
Question 65
An engineer is configuring Cisco FMC and wants to limit the time allowed for processing packets through the interface. However, if the time is exceeded, the configuration must allow packets to bypass detection. What must be configured on the Cisco FMC to accomplish this task?
- A: Cisco ISE Security Group Tag
- B: Automatic Application Bypass
- C: Inspect Local Traffic Bypass
- D: Fast-Path Rules Bypass
Question 66
An engineer must define a URL object on Cisco FMC. What is the correct method to specify the URL without performing SSL inspection?
- A: Include all URLs from CRL Distribution Points.
- B: Use Subject Common Name value.
- C: Specify all subdomains in the object group.
- D: Specify the protocol in the object.
That’s the end of your free questions
You’ve reached the preview limit for 300-710Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!