ExamTopics 300-710 Questions and Answers
ExamTopics 300-710 Questions and Answers
A. For the dynamic routing feature, if the master unit fails, the newly elected master unit
maintains all existing connections.
B. Integrated Routing and Bridging is supported on the master unit.
C. Site-to-site VPN functionality is limited to the master unit, and all VPN connections
are dropped if the master unit fails.
D. All Firepower appliances support Cisco FTD clustering
Correct Answer: C
Question #2 Topic 1
Which two conditions are necessary for high availability to function between two Cisco FTD
devices? (Choose two.)
Correct Answer: AE
Question #3 Topic 1
On the advanced tab under inline set properties, which allows interfaces to emulate a passive
interface?
Correct Answer: D
Question #4 Topic 1
Question #5 Topic 1
What is the difference between inline and inline tap on Cisco Firepower?
A. Inline tap mode can send a copy of the traffic to another device.
B. Inline tap mode does full packet capture.
C. Inline mode cannot do SSL decryption.
D. Inline mode can drop malicious traffic. Most Voted
Correct Answer: D
Question #6 Topic 1
With Cisco FTD software, which interface mode must be configured to passively receive traffic
that passes through the appliance?
A. inline set
B. passive
C. routed
D. inline tap
Correct Answer: B
Question #7 Topic 1
A. transparent
B. routed
C. clustered
D. intra-chassis multi-instance
E. virtual appliance in public cloud
Correct Answer: AB
Question #8 Topic 1
A. STP
B. HSRP
C. GLBP
D. VRRP
Correct Answer: A
Question #9 Topic 1
A. passive
B. inline
C. ERSPAN
D. TAP
Correct Answer: B
Which Cisco Firepower Threat Defense, which two interface settings are required when
configuring a routed interface? (Choose two.)
A. Redundant Interface
B. EtherChannel
C. Speed
D. Media Type
E. Duplex
Correct Answer: CE
Which two dynamic routing protocols are supported in Cisco FTD without using FlexConfig?
(Choose two.)
A. EIGRP
B. OSPF Most Voted
C. static routing
D. IS-IS
E. BGP Most Voted
Correct Answer: CE
Which policy rule is included in the deployment of a local DMZ during the initial deployment of
a Cisco NGFW through the Cisco FMC GUI?
A. a default DMZ policy for which only a user can change the IP addresses.
B. deny ip any
C. no policy rule is included
D. permit ip any
Correct Answer: C
A. CIFS
B. IMAP
C. SSL
D. DNP3
E. ICMP
Correct Answer: BC
An engineer is implementing Cisco FTD in the network and is determining which Firepower
mode to use. The organization needs to have multiple virtual
Firepower devices working separately inside of the FTD appliance to provide traffic
segmentation. Which deployment mode should be configured in the Cisco
Firepower Management Console to support these requirements?
A. multi-instance
B. multiple deployment
C. single deployment
D. single-context
Correct Answer: A
A network engineer is extending a user segment through an FTD device for traffic inspection
without creating another IP subnet. How is this accomplished on an
FTD device in routed mode?
Correct Answer: A
A. passive
B. routed
C. transparent
D. inline set
Correct Answer: D
An organization has noticed that malware was downloaded from a website that does not
currently have a known bad reputation. How will this issue be addressed globally in the quickest
way possible and with the least amount of impact?
Correct Answer: B
The event dashboard within the Cisco FMC has been inundated with low priority intrusion drop
events, which are overshadowing high priority events. An engineer has been tasked with
reviewing the policies and reducing the low priority events. Which action should be configured
to accomplish this task?
A. drop packet
B. generate events
C. drop connection
D. drop and generate
Correct Answer: B
With Cisco FTD integrated routing and bridging, which interface does the bridge group use to
communicate with a routed interface?
A. subinterface
B. switch virtual
C. bridge virtual
D. bridge group member
Correct Answer: C
An engineer is setting up a new Firepower deployment and is looking at the default FMC
policies to start the implementation. During the initial trial phase, the organization wants to test
some common Snort rules while still allowing the majority of network traffic to pass. Which
default policy should be used?
Correct Answer: D
An engineer is configuring a second Cisco FMC as a standby device but is unable to register
with the active unit. What is causing this issue?
A. The code versions running on the Cisco FMC devices are different.
B. The licensing purchased does not include high availability.
C. The primary FMC currently has devices connected to it.
D. There is only 10 Mbps of bandwidth between the two devices.
Correct Answer: A
While configuring FTD, a network engineer wants to ensure that traffic passing though the
appliance does not require routing or VLAN rewriting. Which interface mode should the
engineer implement to accomplish this task?
A. inline set
B. passive
C. transparent
D. inline tap
Correct Answer: B
Correct Answer: B
In a multi-tenant deployment where multiple domains are in use, which update should be applied
outside of the Global Domain?
A. minor upgrade
B. local import of intrusion rules Most Voted
C. Cisco Geolocation Database
D. local import of major upgrade
Correct Answer: C
An organization has a compliancy requirement to protect servers from clients, however, the
clients and servers all reside on the same Layer 3 network. Without readdressing IP subnets for
clients or servers, how is segmentation achieved?
A. Change the IP addresses of the servers, while remaining on the same subnet.
B. Deploy a firewall in routed mode between the clients and servers.
C. Change the IP addresses of the clients, while remaining on the same subnet.
D. Deploy a firewall in transparent mode between the clients and servers. Most Voted
Correct Answer: B
Network traffic coming from an organization's CEO must never be denied. Which access control
policy configuration option should be used if the deployment engineer is not permitted to create
a rule to allow all traffic?
Correct Answer: B
Correct Answer: A
A Cisco FTD device is running in transparent firewall mode with a VTEP bridge group member
ingress interface. What must be considered by an engineer tasked with specifying a destination
MAC address for a packet trace?
Correct Answer: C
With Cisco FTD software, which interface mode must be configured to passively receive traffic
that passes through the appliance?
A. ERSPAN
B. firewall
C. tap
D. IPS-only
Correct Answer: A
Correct Answer: D
A hospital network needs to upgrade their Cisco FMC managed devices and needs to ensure that
a disaster recovery process is in place. What must be done in order to minimize downtime on the
network?
Correct Answer: C
An organization has implemented Cisco Firepower without IPS capabilities and now wants to
enable inspection for their traffic. They need to be able to detect protocol anomalies and utilize
the Snort rule sets to detect malicious behavior. How is this accomplished?
Correct Answer: D
An engineer is tasked with deploying an internal perimeter firewall that will support multiple
DMZs. Each DMZ has a unique private IP subnet range. How is this requirement satisfied?
Correct Answer: C
An engineer must configure high availability for the Cisco Firepower devices. The current
network topology does not allow for two devices to pass traffic concurrently. How must the
devices be implemented in this environment?
A. in active/active mode
B. in a cluster span EtherChannel
C. in active/passive mode
D. in cluster interface mode
Correct Answer: C
When deploying a Cisco ASA Firepower module, an organization wants to evaluate the contents
of the traffic without affecting the network. It is currently configured to have more than one
instance of the same device on the physical appliance. Which deployment mode meets the needs
of the organization?
Correct Answer: B
An organization has a Cisco FTD that uses bridge groups to pass traffic from the inside
interfaces to the outside interfaces. They are unable to gather information about neighboring
Cisco devices or use multicast in their environment. What must be done to resolve this issue?
Correct Answer: D
A. Specify the BVI IP address as the default gateway for connected devices
B. Enable routing on the Cisco Firepower
C. Add an IP address to the physical Cisco Firepower interfaces
D. Configure a bridge group in transparent mode
Correct Answer: D
Which two conditions must be met to enable high availability between two Cisco FTD devices?
(Choose two.)
Correct Answer: BE
An engineer is building a new access control policy using Cisco FMC. The policy must inspect a
unique IPS policy as well as log rule matching. Which action must be taken to meet these
requirements?
Correct Answer: A
Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD?
(Choose two.)
Correct Answer: BE
When creating a report template, how are the results limited to show only the activity of a
specific subnet?
A. Create a custom search in Cisco FMC and select it in each section of the report.
B. Add an Input Parameter in the Advanced Settings of the report, and set the type to
Network/IP.
C. Add a Table View section to the report with the Search field defined as the network in
CIDR format.
D. Select IP Address as the X-Axis in each section of the report.
Correct Answer: B
A. VPN connections can be re-established only if the failed master unit recovers.
B. Smart License is required to maintain VPN connections simultaneously across all
cluster units.
C. VPN connections must be re-established when a new master unit is elected.
D. Only established VPN connections are maintained when a new master unit is elected.
Correct Answer: C
What are two features of bridge-group interfaces in Cisco FTD? (Choose two.)
A. The BVI IP address must be in a separate subnet from the connected network.
B. Bridge groups are supported in both transparent and routed firewall modes. Most
Voted
C. Bridge groups are supported only in transparent firewall mode.
D. Bidirectional Forwarding Detection echo packets are allowed through the FTD when
using bridge-group members.
E. Each directly connected network must be on the same subnet. Most Voted
Correct Answer: CD
Correct Answer: D
Which two actions can be used in an access control policy rule? (Choose two.)
Correct Answer: AB
Which two routing options are valid with Cisco FTD? (Choose two.)
A. BGPv6
B. ECMP with up to three equal cost paths across multiple interfaces
C. ECMP with up to three equal cost paths across a single interface
D. BGPv4 in transparent firewall mode
E. BGPv4 with nonstop forwarding
Correct Answer: AC
A. time range
B. security group tag
C. network object
D. DNS server group
Correct Answer: C
A. Monitor
B. Block
C. Interactive Block
D. Allow with Warning
Correct Answer: C
What is the result a specifying of QoS rule that has a rate limit that is greater than the maximum
throughput of an interface?
Correct Answer: B
Which Firepower feature allows users to configure bridges in routed mode and enables devices
to perform Layer 2 switching between interfaces?
A. FlexConfig
B. BDI
C. SGT
D. IRB
Correct Answer: D
Correct Answer: AC
Correct Answer: AC
Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)
A. dynamic key mapping objects that help link HTTP and HTTPS GET requests to Layer
7 application protocols.
B. reputation-based objects that represent Security Intelligence feeds and lists, application
filters based on category and reputation, and file lists
C. network-based objects that represent IP addresses and networks, port/protocol pairs,
VLAN tags, security zones, and origin/destination country
D. network-based objects that represent FQDN mappings and networks, port/protocol
pairs, VXLAN tags, security zones and origin/destination country
E. reputation-based objects, such as URL categories
Correct Answer: BC
A security engineer is configuring an Access Control Policy for multiple branch locations. These
locations share a common rule set and utilize a network object called INSIDE_NET which
contains the locally significant internal network subnets at each location. What technique will
retain the policy consistency at each location but allow only the locally significant network
subnet within the application rules?
Correct Answer: D
A. Create a NAT policy so that the Cisco Firepower device does not have to translate as
many addresses.
B. Create a flexconfig policy to use WCCP for application aware bandwidth limiting.
C. Create a QoS policy rate-limiting high bandwidth applications.
D. Create a VPN policy so that direct tunnels are established to the business applications.
Correct Answer: C
An engineer configures an access control rule that deploys file policy configurations to security
zone or tunnel zones, and it causes the device to restart. What is the reason for the restart?
A. Source or destination security zones in the access control rule matches the security
zones that are associated with interfaces on the target devices.
B. The source tunnel zone in the rule does not match a tunnel zone that is assigned to a
tunnel rule in the destination policy.
C. Source or destination security zones in the source tunnel zone do not match the
security zones that are associated with interfaces on the target devices.
D. The source tunnel zone in the rule does not match a tunnel zone that is assigned to a
tunnel rule in the source policy.
Correct Answer: A
An engineer is attempting to create a new dashboard within the Cisco FMC to have a single view
with widgets from many of the other dashboards. The goal is to have a mixture of threat and
security related widgets along with Cisco Firepower device health information. Which two
widgets must be configured to provide this information? (Choose two.)
A. Intrusion Events
B. Correlation Information
C. Appliance Status
D. Current Sessions
E. Network Compliance
Correct Answer: AC
Correct Answer: A
An organization is setting up two new Cisco FTD devices to replace their current firewalls and
cannot have any network downtime. During the setup process, the synchronization between the
two devices is failing. What action is needed to resolve this issue?
A. Confirm that both devices are running the same software version.
B. Confirm that both devices are configured with the same types of interfaces.
C. Confirm that both devices have the same flash memory sizes.
D. Confirm that both devices have the same port-channel numbering.
Correct Answer: A
An organization wants to secure traffic from their branch office to the headquarters building
using Cisco Firepower devices. They want to ensure that their Cisco
Firepower devices are not wasting resources on inspecting the VPN traffic. What must be done
to meet these requirements?
A. Configure the Cisco Firepower devices to bypass the access control policies for VPN
traffic.
B. Tune the intrusion policies in order to allow the VPN traffic through without
inspection.
C. Configure the Cisco Firepower devices to ignore the VPN traffic using prefilter
policies.
D. Enable a flexconfig policy to re-classify VPN traffic so that it no longer appears as
interesting traffic.
Correct Answer: A
A. Prefilter
B. Intrusion
C. Access Control
D. Identity
Correct Answer: A
A network administrator is seeing an unknown verdict for a file detected by Cisco FTD. Which
malware policy configuration option must be selected in order to further analyze the file in the
Talos cloud?
A. malware analysis
B. dynamic analysis
C. sandbox analysis
D. Spero analysis
Correct Answer: B
An engineer has been tasked with providing disaster recovery for an organization's primary
Cisco FMC. What must be done on the primary and secondary Cisco
FMCs to ensure that a copy of the original corporate policy is available if the primary Cisco
FMC fails?
A. Restore the primary Cisco FMC backup configuration to the secondary Cisco FMC
device when the primary device fails.
B. Connect the primary and secondary Cisco FMC devices with Category 6 cables of not
more than 10 meters in length.
C. Configure high-availability in both the primary and secondary Cisco FMCs.
D. Place the active Cisco FMC device on the same trusted management network as the
standby device.
Correct Answer: C
An engineer is attempting to add a new FTD device to their FMC behind a NAT device with a
NAT ID of ACME001 and a password of Cisco0391521107. Which command set must be used
in order to accomplish this?
A. configure manager add<FMC IP> <registration key>ACME001
B. configure manager add ACME001<registration key> <FMC IP>
C. configure manager add <FMC IP>ACME001<registration key>
D. configure manager add DONTRESOLVE <FMC IP> AMCE001<registration key>
Correct Answer: A
Refer to the exhibit. An organization has an access control rule with the intention of sending all
social media traffic for inspection. After using the rule for some time, the administrator notices
that the traffic is not being inspected, but is being automatically allowed. What must be done to
address this issue?
Correct Answer: C
A user within an organization opened a malicious file on a workstation which in turn caused a
ransomware attack on the network. What should be configured within the Cisco FMC to ensure
the file is tested for viruses on a sandbox system?
A. Spero analysis
B. capacity handling
C. local malware analysis
D. dynamic analysis
Correct Answer: D
Correct Answer: A
A network administrator notices that remote access VPN users are not reachable from inside the
network. It is determined that routing is configured correctly; however, return traffic is entering
the firewall but not leaving it. What is the reason for this issue?
A. A manual NAT exemption rule does not exist at the top of the NAT table
B. An external NAT IP address is not configured
C. An external NAT IP address is configured to match the wrong interface
D. An object NAT exemption rule does not exist at the top of the NAT table
Correct Answer: D
An administrator is creating interface objects to better segment their network but is having
trouble adding interfaces to the objects. What is the reason for this failure?
A. The interfaces are being used for NAT for multiple networks
B. The administrator is adding interfaces of multiple types
C. The administrator is adding an interface that is in multiple zones
D. The interfaces belong to multiple interface groups
Correct Answer: D
A. Modify the Cisco ISE authorization policy to deny this access to the user
B. Modify Cisco ISE to send only legitimate usernames to the Cisco FTD
C. Add the unknown user in the Access Control Policy in Cisco FTD
D. Add the unknown user in the Malware & File Policy in Cisco FTD
Correct Answer: C
What is the benefit of selecting the trace option for packet capture?
Correct Answer: C
After deploying a network-monitoring tool to manage and monitor networking devices in your
organization, you realize that you need to manually upload an MIB for the Cisco FMC. In which
folder should you upload the MIB file?
A. /etc/sf/DCMIB.ALERT
B. /sf/etc/DCEALERT.MIB
C. /etc/sf/DCEALERT.MIB
D. system/etc/DCEALERT.MIB
Correct Answer: C
Which command is run at the CLI when logged in to an FTD unit, to determine whether the unit
is managed locally or by a remote FMC server?
A. system generate-troubleshoot
B. show configuration session
C. show managers
D. show running-config | include manager
Correct Answer: C
Which command should be used on the Cisco FTD CLI to capture all the packets that hit an
interface?
Correct Answer: B
How many report templates does the Cisco Firepower Management Center support?
A. 20
B. 10
C. 5
D. unlimited
Correct Answer: D
Which action should be taken after editing an object that is used inside an access control policy?
Correct Answer: C
Which Cisco Firepower feature is used to reduce the number of events received in a period of
time?
A. rate-limiting
B. suspending
C. correlation
D. thresholding
Correct Answer: D
Correct Answer: C
Which group within Cisco does the Threat Response team use for threat analysis and research?
Correct Answer: D
DRAG DROP -
Drag and drop the steps to restore an automatic device registration failure on the standby Cisco
FMC from the left into the correct order on the right. Not all options are used.
Select and Place:
Correct Answer:
Question #81 Topic 1
Which CLI command is used to generate firewall debug messages on a Cisco Firepower?
Correct Answer: A
A. privileged
B. user
C. configuration
D. admin
Correct Answer: C
Which command is entered in the Cisco FMC CLI to generate a troubleshooting file?
A. show running-config
B. show tech-support chassis
C. system support diagnostic-cli
D. sudo sf_troubleshoot.pl
Correct Answer: D
Correct Answer: A
Correct Answer: B
Correct Answer: B
When is the file-size command needed while troubleshooting with packet capture?
Correct Answer: D
A. to mix transport protocols when setting both source and destination port conditions in
a rule
B. to represent protocols other than TCP, UDP, and ICMP
C. to represent all protocols in the same way
D. to add any protocol other than TCP or UDP for source port conditions in access
control rules.
Correct Answer: B
A. dashboard
B. reporting
C. context explorer
D. summary tool
Correct Answer: A
A network engineer is configuring URL Filtering on Cisco FTD. Which two port requirements
on the FMC must be validated to allow communication with the cloud service? (Choose two.)
Correct Answer: AE
What is the maximum bit size that Cisco FMC supports for HTTPS certificates?
A. 1024
B. 8192
C. 4096
D. 2048
Correct Answer: D
A. Child domains are able to view but not edit dashboards that originate from an ancestor
domain.
B. Child domains have access to only a limited set of widgets from ancestor domains.
C. Only the administrator of the top ancestor domain is able to view dashboards.
D. Child domains are not able to view dashboards that originate from an ancestor domain.
Correct Answer: D
A. An option to re-apply NAT and VPN policies during registration is available, so users
do not need to re-apply the policies after registration is completed.
B. Before re-adding the device in Cisco FMC, the manager must be added back.
C. Once a device has been deleted, it must be reconfigured before it is re-added to the
Cisco FMC.
D. The Cisco FMC web interface prompts users to re-apply access control policies.
E. There is no option to re-apply NAT and VPN policies during registration available, so
users need to re-apply the policies after registration is completed.
Correct Answer: DE
A. User login and history data are removed from the database if the User Activity check
box is selected.
B. Data is recovered from the device.
C. The appropriate process is restarted.
D. The specified data is removed from Cisco FMC and kept for two weeks.
Correct Answer: C
Which two packet captures does the FTD LINA engine support? (Choose two.)
A. Layer 7 network ID
B. source IP
C. application ID
D. dynamic firewall importing
E. protocol
Correct Answer: BE
An engineer currently has a Cisco FTD device registered to the Cisco FMC and is assigned the
address of 10.10.50.12. The organization is upgrading the addressing schemes and there is a
requirement to convert the addresses to a format that provides an adequate amount of addresses
on the network. What should the engineer do to ensure that the new addressing takes effect and
can be used for the Cisco FTD to Cisco FMC connection?
A. Update the IP addresses from IPv4 to IPv6 without deleting from Cisco FMC.
B. Format and reregister the device to Cisco FMC.
C. Cisco FMC does not support devices that use IPv4 IP addresses.
D. Delete and reregister the device to Cisco FMC. Most Voted
Correct Answer: A
Refer to the exhibit. An engineer is analyzing the Attacks Risk Report and finds that there are
over 300 instances of new operating systems being seen on the network. How is the Firepower
configuration updated to protect these new operating systems?
Correct Answer: C
After using Firepower for some time and learning about how it interacts with the network, an
administrator is trying to correlate malicious activity with a user. Which widget should be
configured to provide this visibility on the Cisco Firepower dashboards?
A. Current Sessions
B. Correlation Events
C. Current Status
D. Custom Analysis
Correct Answer: B
An engineer is troubleshooting application failures through an FTD deployment. While using the
FMC CLI, it has been determined that the traffic in question is not matching the desired policy.
What should be done to correct this?
A. Use the system support firewall-engine-debug command to determine which rules the
traffic matching and modify the rule accordingly.
B. Use the system support firewall-engine-dump-user-identity-data command to change
the policy and allow the application though the firewall.
C. Use the system support application-identification-debug command to determine which
rules the traffic matching and modify the rule accordingly.
D. Use the system support network-options command to fine tune the policy.
Correct Answer: A
An engineer has been asked to show application usages automatically on a monthly basis and
send the information to management. What mechanism should be used to accomplish this task?
A. reports
B. context explorer
C. dashboards
D. event viewer
Correct Answer: A
Correct Answer: C
A.
B.
C.
D.
Correct Answer: B
A network engineer is receiving reports of users randomly getting disconnected from their
corporate applications which traverse the data center FTD appliance.
Network monitoring tools show that the FTD appliance utilization is peaking above 90% of total
capacity. What must be done in order to further analyze this issue?
A. Use the Packet Export feature to save data onto external drives.
B. Use the Packet Capture feature to collect real-time network traffic.
C. Use the Packet Tracer feature for traffic policy analysis.
D. Use the Packet Analysis feature for capturing network data.
Correct Answer: B
An administrator is attempting to remotely log into a switch in the data center using SSH and is
unable to connect. How does the administrator confirm that traffic is reaching the firewall?
A. by performing a packet capture on the firewall Most Voted
B. by attempting to access it from a different workstation
C. by running Wireshark on the administrator's PC
D. by running a packet tracer on the firewall
Correct Answer: D
IT management is asking the network engineer to provide high-level summary statistics of the
Cisco FTD appliance in the network. The business is approaching a peak season so the need to
maintain business uptime is high. Which report type should be used to gather this information?
A. Risk Report
B. SNMP Report
C. Standard Report
D. Malware Report
Correct Answer: A
Refer to the exhibit. An administrator is looking at some of the reporting capabilities for Cisco
Firepower and noticed this section of the Network Risk Report showing a lot of SSL activity that
could be used for evasion. Which action will mitigate this risk?
A. Use SSL decryption to analyze the packets.
B. Use Cisco Tetration to track SSL connections to servers.
C. Use encrypted traffic analytics to detect attacks.
D. Use Cisco AMP for Endpoints to block all SSL connection.
Correct Answer: A
Correct Answer: D
With a recent summer time change, system logs are showing activity that occurred to be an hour
behind real time. Which action should be taken to resolve this issue?
A. Manually adjust the time to the correct hour on all managed devices.
B. Configure the system clock settings to use NTP with Daylight Savings checked.
C. Configure the system clock settings to use NTP.
D. Manually adjust the time to the correct hour on the Cisco FMC.
Correct Answer: B
A network administrator notices that SI events are not being updated. The Cisco FTD device is
unable to load all of the SI event entries and traffic is not being blocked as expected. What must
be done to correct this issue?
Correct Answer: D
Question #110 Topic 1
Refer to the exhibit. What must be done to fix access to this website while preventing the same
A. Create an intrusion policy rule to have Snort allow port 80 to only 172.1.1.50.
B. Create an intrusion policy rule to have Snort allow port 443 to only 172.1.1.50.
C. Create an access control policy rule to allow port 443 to only 172.1.1.50.
D. Create an access control policy rule to allow port 80 to only 172.1.1.50.
Correct Answer: D
A connectivity issue is occurring between a client and a server which are communicating through
a Cisco Firepower device. While troubleshooting, a network administrator sees that traffic is
reaching the server, but the client is not getting a response. Which step must be taken to resolve
this issue without initiating traffic from the client?
A. Use packet-tracer to ensure that traffic is not being blocked by an access list
B. Use packet capture to ensure that traffic is not being blocked by an access list
C. Use packet capture to validate that the packet passes through the firewall and is
NATed to the corrected IP address
D. Use packet-tracer to validate that the packet passes through the firewall and is NATed
to the corrected IP address
Correct Answer: D
A VPN user is unable to connect to web resources behind the Cisco FTD device terminating the
connection. While troubleshooting, the network administrator determines that the DNS response
are not getting through the Cisco FTD. What must be done to address this issue while still
utilizing Snort IPS rules?
A. Uncheck the ג€Drop when Inlineג€ box in the intrusion policy to allow the traffic
B. Modify the Snort rules to allow legitimate DNS traffic to the VPN users
C. Disable the intrusion rule thresholds to optimize the Snort processing
D. Decrypt the packet after the VPN flow so the DNS queries are not inspected
Correct Answer: B
An engineer is restoring a Cisco FTD configuration from a remote backup using the command
restore remote-manager-backup location 1.1.1.1 admin /
Volume/home/admin BACKUP_Cisc394602314.zip on a Cisco FMC. After connecting to the
repository, an error occurred that prevents the FTD device from accepting the backup file. What
is the problem?
A. The backup file is not in .cfg format
B. The backup file is too large for the Cisco FTD device
C. The backup file extension was changed from .tar to .zip
D. The backup file was not enabled prior to being applied
Correct Answer: C
An organization has a Cisco IPS running in inline mode and is inspecting traffic for malicious
activity. When traffic is received by the Cisco IPS, if it is not dropped, how does the traffic get to
its destination?
Correct Answer: D
Correct Answer: B
An organization must be able to ingest NetFlow traffic from their Cisco FTD device to Cisco
Stealthwatch for behavioral analysis. What must be configured on the
Cisco FTD to meet this requirement?
Correct Answer: A
Question #117 Topic 1
An engineer must build redundancy into the network and traffic must continuously flow if a
redundant switch in front of the firewall goes down. What must be configured to accomplish this
task?
Correct Answer: D
A network administrator notices that inspection has been interrupted on all non-managed
interfaces of a device. What is the cause of this?
A. The value of the highest MTU assigned to any non-management interface was
changed
B. The value of the highest MSS assigned to any non-management interface was changed
C. A passive interface was associated with a security zone
D. Multiple inline interface pairs were added to the same inline interface
Correct Answer: A
A network administrator needs to create a policy on Cisco Firepower to fast-path traffic to avoid
Layer 7 inspection. The rate at which traffic is inspected must be optimized. What must be done
to achieve this goal?
Correct Answer: B
A network engineer is tasked with minimizing traffic interruption during peak traffic times.
When the SNORT inspection engine is overwhelmed, what must be configured to alleviate this
issue?
Correct Answer: D
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked?
(Choose two.)
A. application blocking
B. simple custom detection
C. file repository
D. exclusions
E. application allow listing
Correct Answer: AB
Which action should you take when Cisco Threat Response notifies you that AMP has identified
a file as malware?
Correct Answer: A
Which Cisco AMP for Endpoints policy is used only for monitoring endpoint activity?
Correct Answer: B
Correct Answer: B
In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot be
reached?
A. unavailable
B. unknown
C. clean
D. disconnected
Correct Answer: A
Which two remediation options are available when Cisco FMC is integrated with Cisco ISE?
(Choose two.)
Correct Answer: CD
Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat Containment?
A. pxGrid
B. FTD RTC
C. FMC RTC
D. ISEGrid
Correct Answer: A
What is the maximum SHA level of filtering that Threat Intelligence Director supports?
A. SHA-1024
B. SHA-4096
C. SHA-512
D. SHA-256
Correct Answer: D
What is the advantage of having Cisco Firepower devices send events to Cisco Threat Response
via the security services exchange portal directly as opposed to using syslog?
Correct Answer: B
Which license type is required on Cisco ISE to integrate with Cisco FMC pxGrid?
A. apex
B. plus
C. base
D. mobility
Correct Answer: B
Correct Answer: D
Which feature within the Cisco FMC web interface allows for detecting, analyzing, and blocking
malware in network traffic?
A. intrusion and file events
B. Cisco AMP for Networks
C. file policies
D. Cisco AMP for Endpoints
Correct Answer: B
A network administrator discovers that a user connected to a file server and downloaded a
malware file. The Cisco FMC generated an alert for the malware event, however the user still
remained connected. Which Cisco AMP file rule action within the Cisco FMC must be set to
resolve this issue?
Correct Answer: A
An engineer has been tasked with using Cisco FMC to determine if files being sent through the
network are malware. Which two configuration tasks must be performed to achieve this file
lookup? (Choose two.)
Correct Answer: CE
A network engineer wants to add a third-party threat feed into the Cisco FMC for enhanced
threat detection. Which action should be taken to accomplish this goal?
A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious
verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?
Correct Answer: A
A network administrator is concerned about the high number of malware files affecting users'
machines. What must be done within the access control policy in
Cisco FMC to address this concern?
A. Create an intrusion policy and set the access control policy to block
B. Create an intrusion policy and set the access control policy to allow
C. Create a file policy and set the access control policy to allow Most Voted
D. Create a file policy and set the access control policy to block
Correct Answer: D