Pass the Cisco CCNP Security 300-710 Questions and answers with CertsForce

Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions
Questions # 91:

With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?

Options:

A.

inline set


B.

passive


C.

routed


D.

inline tap


Expert Solution
Questions # 92:

An engineer is configuring a Cisco IPS to protect the network and wants to test a policy before deploying it. A copy of each incoming packet needs to be monitored while traffic flow remains constant. Which IPS mode should be implemented to meet these requirements?

Options:

A.

Inline tap


B.

passive


C.

transparent


D.

routed


Expert Solution
Questions # 93:

Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)

Options:

A.

application blocking


B.

simple custom detection


C.

file repository


D.

exclusions


E.

application whitelisting


Expert Solution
Questions # 94:

Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?

Options:

A.

Add the malicious file to the block list.


B.

Send a snapshot to Cisco for technical support.


C.

Forward the result of the investigation to an external threat-analysis engine.


D.

Wait for Cisco Threat Response to automatically block the malware.


Expert Solution
Questions # 95:

Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?

Options:

A.

Windows domain controller


B.

audit


C.

triage


D.

protection


Expert Solution
Questions # 96:

Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat Containment?

Options:

A.

pxGrid


B.

FTD RTC


C.

FMC RTC


D.

ISEGrid


Expert Solution
Questions # 97:

Which two remediation options are available when Cisco FMC is integrated with Cisco ISE? (Choose two.)

Options:

A.

dynamic null route configured


B.

DHCP pool disablement


C.

quarantine


D.

port shutdown


E.

host shutdown


Expert Solution
Questions # 98:

What is the maximum SHA level of filtering that Threat Intelligence Director supports?

Options:

A.

SHA-1024


B.

SHA-4096


C.

SHA-512


D.

SHA-256


Expert Solution
Questions # 99:

What is a valid Cisco AMP file disposition?

Options:

A.

non-malicious


B.

malware


C.

known-good


D.

pristine


Expert Solution
Questions # 100:

In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot be reached?

Options:

A.

unavailable


B.

unknown


C.

clean


D.

disconnected


Expert Solution
Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions