Pass the Cisco CCNP Security 300-710 Questions and answers with CertsForce

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

An engineer configures a network discovery policy on Cisco FMC. Upon configuration, it is noticed that excessive and misleading events filing the database and overloading the Cisco FMC. A monitored NAT device is executing multiple updates of its operating system in a short period of time. What configurationchange must be made to alleviate this issue?

Options:

A.

Leave default networks.


B.

Change the method to TCP/SYN.


C.

Increase the number of entries on the NAT device.


D.

Exclude load balancers and NAT devices.


Expert Solution
Questions # 12:

Which object type supports object overrides?

Options:

A.

time range


B.

security group tag


C.

network object


D.

DNS server group


Expert Solution
Questions # 13:

A company is in the process of deploying intrusion prevention with Cisco FTDs managed by a Cisco FMC. An engineer must configure policies to detect potential intrusions but not block the suspicious traffic. Which action accomplishes this task?

Options:

A.

Configure IDS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by unchecking the "Drop when inline" option.


B.

Configure IPS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by checking the "Drop when inline" option.


C.

Configure IPS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by unchecking the "Drop when inline" option.


D.

Configure IDS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by checking the "Drop when inline" option.


Expert Solution
Questions # 14:

An engineer is configuring Cisco FMC and wants to allow multiple physical interfaces to be part of the same VLAN. The managed devices must be able to perform Layer 2 switching between interfaces, including sub-interfaces. What must be configured to meet these requirements?

Options:

A.

interface-based VLAN switching


B.

inter-chassis clustering VLAN


C.

integrated routing and bridging


D.

Cisco ISE Security Group Tag


Expert Solution
Questions # 15:

A company has many Cisco FTD devices managed by a Cisco FMC. The security model requires that access control rule logs be collected for analysis. The security engineer is concerned that the Cisco FMC will not be able to process the volume of logging that will be generated. Which configuration addresses this concern?

Options:

A.

Send Cisco FTD connection events and security events directly to SIEM system for storage and analysis.


B.

Send Cisco FTD connection events and security events to a cluster of Cisco FMC devices for storage and analysis.


C.

Send Cisco FTD connection events and security events to Cisco FMC and configure it to forward logs to SIEM for storage and analysis.


D.

Send Cisco FTD connection events directly to a SIEM system and forward security events from Cisco FMC to the SIEM system for storage and analysis.


Expert Solution
Questions # 16:

When creating a report template, how can the results be limited to show only the activity of a specific subnet?

Options:

A.

Create a custom search in Firepower Management Center and select it in each section of the report.


B.

Add an Input Parameter in the Advanced Settings of the report, and set the type to Network/IP.


C.

Add a Table View section to the report with the Search field defined as the network in CIDR format.


D.

Select IP Address as the X-Axis in each section of the report.


Expert Solution
Questions # 17:

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

Options:

A.

Traffic inspection can be interrupted temporarily when configuration changes are deployed.


B.

The system performs intrusion inspection followed by file inspection.


C.

They can block traffic based on Security Intelligence data.


D.

File policies use an associated variable set to perform intrusion prevention.


E.

The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.


Expert Solution
Questions # 18:

What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?

Options:

A.

VPN connections can be re-established only if the failed master unit recovers.


B.

Smart License is required to maintain VPN connections simultaneously across all cluster units.


C.

VPN connections must be re-established when a new master unit is elected.


D.

Only established VPN connections are maintained when a new master unit is elected.


Expert Solution
Questions # 19:

Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)

Options:

A.

dynamic key mapping objects that help link HTTP and HTTPS GET requests to Layer 7 application protocols.


B.

reputation-based objects that represent Security Intelligence feeds and lists, application filters based on category and reputation, and file lists


C.

network-based objects that represent IP address and networks, port/protocols pairs, VLAN tags, security zones, and origin/destination country


D.

network-based objects that represent FQDN mappings and networks, port/protocol pairs, VXLAN tags, security zones and origin/destination country


E.

reputation-based objects, such as URL categories


Expert Solution
Questions # 20:

Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)

Options:

A.

BGPv6


B.

ECMP with up to three equal cost paths across multiple interfaces


C.

ECMP with up to three equal cost paths across a single interface


D.

BGPv4 in transparent firewall mode


E.

BGPv4 with nonstop forwarding


Expert Solution
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions