Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 300-710 Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions
Questions # 61:

A network administrator is concerned about (he high number of malware files affecting users' machines. What must be done within the access control policy in Cisco FMC to address this concern?

Options:

A.

Create an intrusion policy and set the access control policy to block.


B.

Create an intrusion policy and set the access control policy to allow.


C.

Create a file policy and set the access control policy to allow.


D.

Create a file policy and set the access control policy to block.


Expert Solution
Questions # 62:

An analyst is reviewing the Cisco FMC reports for the week. They notice that some peer-to-peer applications are being used on the network and they must identify which poses the greatest risk to the environment. Which report gives the analyst this information?

Options:

A.

Attacks Risk Report


B.

User Risk Report


C.

Network Risk Report


D.

Advanced Malware Risk Report


Expert Solution
Questions # 63:

An administrator is setting up Cisco Firepower to send data to the Cisco Stealthwatch appliances. The NetFlow_Set_Parameters object is already created, but NetFlow is not being sent to the flow collector. What must be done to prevent this from occurring?

Options:

A.

Add the NetFlow_Send_Destination object to the configuration


B.

Create a Security Intelligence object to send the data to Cisco Stealthwatch


C.

Create a service identifier to enable the NetFlow service


D.

Add the NetFlow_Add_Destination object to the configuration


Expert Solution
Questions # 64:

Which Cisco Firepower rule action displays an HTTP warning page?

Options:

A.

Monitor


B.

Block


C.

Interactive Block


D.

Allow with Warning


Expert Solution
Questions # 65:

Question # 65

Refer to the exhibit. An engineer must import three network objects into the Cisco Secure Firewall Management Center by using a CSV file. Which header must be configured in the CSV file to accomplish the task?

Options:

A.

NAME;DESCRIPTION;TYPE;VALUE;LOOKUP;


B.

Name; Description; Type;Value;Lookup;


C.

Name; Description; Type;Value;DN;


D.

NAME;DESCRIPTION; TYPE;VALUE;DN;


Expert Solution
Questions # 66:

What is the maximum SHA level of filtering that Threat Intelligence Director supports?

Options:

A.

SHA-1024


B.

SHA-4096


C.

SHA-512


D.

SHA-256


Expert Solution
Questions # 67:

An engineer Is configuring a Cisco FTD device to place on the Finance VLAN to provide additional protection tor company financial data. The device must be deployed without requiring any changes on the end user workstations, which currently use DHCP lo obtain an IP address. How must the engineer deploy the device to meet this requirement?

Options:

A.

Deploy the device in routed mode and allow DHCP traffic in the access control policies.


B.

Deploy the device in routed made aid enable the DHCP Relay feature.


C.

Deploy the device in transparent mode and allow DHCP traffic in the access control policies


D.

Deploy the device in transparent mode and enable the DHCP Server feature.


Expert Solution
Questions # 68:

What is a characteristic of bridge groups on a Cisco FTD?

Options:

A.

In routed firewall mode, routing between bridge groups must pass through a routed interface.


B.

In routed firewall mode, routing between bridge groups is supported.


C.

In transparent firewall mode, routing between bridge groups is supported


D.

Routing between bridge groups is achieved only with a router-on-a-stick configuration on a connected router


Expert Solution
Questions # 69:

A network administrator is implementing an active/passive high availability Cisco FTD pair.

When adding the high availability pair, the administrator cannot select the secondary peer.

What is the cause?

Options:

A.

The second Cisco FTD is not the same model as the primary Cisco FTD.


B.

An high availability license must be added to the Cisco FMC before adding the high availability pair.


C.

The failover link must be defined on each Cisco FTD before adding the high availability pair.


D.

Both Cisco FTD devices are not at the same software Version


Expert Solution
Questions # 70:

Refer to the exhibit.

Question # 70

An organization has an access control rule with the intention of sending all social media traffic for inspection After using the rule for some time, the administrator notices that the traffic is not being inspected, but is being automatically allowed What must be done to address this issue?

Options:

A.

Modify the selected application within the rule


B.

Change the intrusion policy to connectivity over security.


C.

Modify the rule action from trust to allow


D.

Add the social network URLs to the block list


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 61-70 out of questions