Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 300-710 Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions
Questions # 21:

An engineer is configuring Cisco FMC and wants to allow multiple physical interfaces to be part of the same VLAN. The managed devices must be able to perform Layer 2 switching between interfaces, including sub-interfaces. What must be configured to meet these requirements?

Options:

A.

interface-based VLAN switching


B.

inter-chassis clustering VLAN


C.

integrated routing and bridging


D.

Cisco ISE Security Group Tag


Expert Solution
Questions # 22:

When packet capture is used on a Cisco Secure Firewall Threat Defense device and the packet flow is wailing on the malware query, which Snort verdict appears?

Options:

A.

retry


B.

replace


C.

block


D.

blocfcflow


Expert Solution
Questions # 23:

An organization is migrating their Cisco ASA devices running in multicontext mode to Cisco FTD devices. Which action must be taken to ensure that each context on the Cisco ASA is logically separated in the Cisco FTD devices?

Options:

A.

Add a native instance to distribute traffic to each Cisco FTD context.


B.

Add the Cisco FTD device to the Cisco ASA port channels.


C.

Configure a container instance in the Cisco FTD for each context in the Cisco ASA.


D.

Configure the Cisco FTD to use port channels spanning multiple networks.


Expert Solution
Questions # 24:

What is the result of specifying of QoS rule that has a rate limit that is greater than the maximum throughput of an interface?

Options:

A.

The rate-limiting rule is disabled.


B.

Matching traffic is not rate limited.


C.

The system rate-limits all traffic.


D.

The system repeatedly generates warnings.


Expert Solution
Questions # 25:

An engineer is setting up a remote access VPN on a Cisco FTD device and wants to define which traffic gets sent over the VPN tunnel. Which named object type in Cisco FMC must be used to accomplish this task?

Options:

A.

split tunnel


B.

crypto map


C.

access list


D.

route map


Expert Solution
Questions # 26:

An engineer must implement static route tracking on a Cisco Secure Firewall Threat Defense appliance. Static route and IP SLA operation has already been configured. Static route must be removed from the routing table if the tracked object is unreachable. Which action must the engineer take next to meet the requirement?

Options:

A.

Implement a secondary route that has a higher precedence.


B.

Enable the IP SLA Responder on the backup path interface.


C.

Assign a tracking object to the static route and the IP SLA operation.


D.

Enable an ICMP redirect message on the interface connected to the backup path.


Expert Solution
Questions # 27:

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

Options:

A.

Traffic inspection can be interrupted temporarily when configuration changes are deployed.


B.

The system performs intrusion inspection followed by file inspection.


C.

They can block traffic based on Security Intelligence data.


D.

File policies use an associated variable set to perform intrusion prevention.


E.

The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.


Expert Solution
Questions # 28:

When a Cisco FTD device is configured in transparent firewall mode, on which two interface types can an IP address be configured? (Choose two.)

Options:

A.

Diagnostic


B.

EtherChannel


C.

BVI


D.

Physical


E.

Subinterface


Expert Solution
Questions # 29:

Which two solutions are used to access and view aggregated log data from the firewalls using Cisco Security Analytics and Logging? (Choose two.)

Options:

A.

Cisco Secure Network Analytics


B.

Cisco Defense Orchestrator


C.

Cisco Catalyst Center


D.

Secure Cloud Analytics


E.

Cisco Prime Infrastructure


Expert Solution
Questions # 30:

An organization created a custom application that is being flagged by Cisco Secure Endpoint. The application must be exempt from being flagged. What is the process to meet the requirement?

Options:

A.

Modify the custom detection list to exclude me custom application.


B.

Preculculate the hash value of the custom application and add it to the allowed applications.


C.

Configure the custom application to use the information-store paths.


D.

Add the custom application to the DFC 1st and update the policy.


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions