Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 300-710 Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions
Questions # 11:

A network engineer wants to add a third-party threat feed into the Cisco FMC for enhanced threat detectionWhich action should be taken to accomplish this goal?

Options:

A.

Enable Threat Intelligence Director using STIX and TAXII


B.

Enable Rapid Threat Containment using REST APIs


C.

Enable Threat Intelligence Director using REST APIs


D.

Enable Rapid Threat Containment using STIX and TAXII


Expert Solution
Questions # 12:

An engineer is configuring Cisco Security Devices by using Cisco Secure Firewall Management Center. Which configuration command must be run to compare the CA certificate bundle on the local system to the latest CA bundle from the Cisco server?

Options:

A.

configure cert-update compare


B.

configure cert-update auto-update enable


C.

configure cert-update run-now


D.

configure cert-update test


Expert Solution
Questions # 13:

In a multi-tennent deployment where multiple domains are in use. which update should be applied outside of the Global Domain?

Options:

A.

minor upgrade


B.

local import of intrusion rules


C.

Cisco Geolocation Database


D.

local import of major upgrade


Expert Solution
Questions # 14:

An organization has noticed that malware was downloaded from a website that does not currently have a known bad reputation. How will this issue be addresses globally in the quickest way possible and with the least amount of impact?

Options:

A.

by denying outbound web access


B.

Cisco Talos will automatically update the policies.


C.

by Isolating the endpoint


D.

by creating a URL object in the policy to block the website


Expert Solution
Questions # 15:

Which CLI command is used to generate firewall debug messages on a Cisco Firepower?

Options:

A.

system support firewall-engine-debug


B.

system support ssl-debug


C.

system support platform


D.

system support dump-table


Expert Solution
Questions # 16:

Question # 16

Question # 16

Refer to the exhibit. A client that has IP address 192.168.67.102 reports issues when connecting to a remote server. Based on the topology and output of packet tracer tool, which action resolves the connectivity issue?

Options:

A.

Add the route to the destination.


B.

Unblock the access rule on FTDv.


C.

Restart the client-side application.


D.

Reconfigure NAT on FTDv.


Expert Solution
Questions # 17:

A network engineer must monitor threat events from the console of Cisco Secure Firewall Management Center. The engineer integrates the Cisco Secure Firewall Malware Defense in Secure Firewall Management Center. Which action must the engineer take next?

Options:

A.

Log in to Cisco Secure Endpoint, click Allow to authorize the Secure Firewall Malware Defense to Secure FMC connection, and add a Secure Firewall Malware Defense cloud connection to Secure FMC.


B.

Log in to Secure Endpoint, click Allow to authorize the Secure Firewall Malware Defense to Secure FMC connection, add a Secure Firewall Malware Defense cloud connection to Secure FMC, and select the Secure Firewall Malware Defense cloud for Secure Endpoint.


C.

Add a Secure Firewall Malware Defense cloud connection in Secure FMC, log in to Secure Endpoint, and click Allow to authorize the Secure Firewall Malware Defense to Secure FMC connection.


D.

Add a Secure Firewall Malware Defense cloud connection in Secure FMC, select the Secure Firewall Malware Defense cloud for Secure Endpoint, log in to Secure Endpoint, and click Allow to authorize the Secure Firewall Malware Defense to Secure FMC connection.


Expert Solution
Questions # 18:

Which two actions can be used in an access control policy rule? (Choose two.)

Options:

A.

Block with Reset


B.

Monitor


C.

Analyze


D.

Discover


E.

Block ALL


Expert Solution
Questions # 19:

An organization wants to secure traffic from their branch office to the headquarter building using Cisco Firepower devices, They want to ensure that their Cisco Firepower devices are not wasting resources on inspecting the VPN traffic. What must be done to meet these requirements?

Options:

A.

Configure the Cisco Firepower devices to ignore the VPN traffic using prefilter policies


B.

Enable a flexconfig policy to re-classify VPN traffic so that it no longer appears as interesting traffic


C.

Configure the Cisco Firepower devices to bypass the access control policies for VPN traffic.


D.

Tune the intrusion policies in order to allow the VPN traffic through without inspection


Expert Solution
Questions # 20:

A network administrator reviews the file report for the last month and notices that all file types, except exe. show a disposition of unknown. What is the cause of this issue?

Options:

A.

The malware license has not been applied to the Cisco FTD.


B.

The Cisco FMC cannot reach the Internet to analyze files.


C.

A file policy has not been applied to the access policy.


D.

Only Spero file analysis is enabled.


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 11-20 out of questions