최신 300-710 무료덤프 - Cisco Securing Networks with Cisco Firepower
A company is deploying intrusion protection on multiple Cisco FTD appliances managed by Cisco FMC. Which system-provided policy must be selected if speed and detection are priorities?
정답: D
Upon detecting a flagrant threat on an endpoint, which two technologies instruct Cisco Identity Services Engine to contain the infected endpoint either manually or automatically? (Choose two.)
정답: B,C
What Software can be installed on the Cisco 4100 series appliance? (Choose two)
정답: B,C
Which two field can be used to create a new email alert within the Cisco Firepower Management center under Policies > Actions > Alerts tab? (Choose two.)
정답: A,B
Which access control policy action must be selected to inspect traffic for malware using cisco AMP for Networks?
정답: A
An engineer is troubleshooting a file that is being blocked by a Cisco FTD device on the network.
The user is reporting that the file is not malicious. Which action does the engineer take to identify the file and validate whether or not it is malicious?
The user is reporting that the file is not malicious. Which action does the engineer take to identify the file and validate whether or not it is malicious?
정답: A
A network administrator is configuring a Cisco AMP public cloud instance and wants to capture infections and polymorphic variants of a threat to help detect families of malware. Which detection engine meets this requirement?
정답: A
A Cisco FTD device is running in transparent firewall mode with a VTEP bridge group member ingress interface.
What must be considered by an engineer tasked with specifying a destination MAC address for a packet trace?
What must be considered by an engineer tasked with specifying a destination MAC address for a packet trace?
정답: B
설명: (DumpTOP 회원만 볼 수 있음)
A security engineer sees an alert on Cisco Secure Endpoint console showing a malicious verdict for a file with the SHA-256 hash
0488537078abcdef048853abcdef048853abcdef048853abcdef048853abcdef048853. Which step will mitigate this threat?
0488537078abcdef048853abcdef048853abcdef048853abcdef048853abcdef048853. Which step will mitigate this threat?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Within Cisco Firepower Management Center, where does a user add or modify widgets?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
An engineer is configuring a new dashboard within Cisco Secure Firewall Management Center and is having trouble implementing a custom widget. When a custom analysis widget is configured, which option is mandatory for the system to display the information?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An engineer must investigate a connectivity issue and decides to use the packet capture feature on Cisco FTD. The goal is to see the real packet going through the Cisco FTD device and see Snort detection actions as a part of the output. After the capture-traffic command is issued, only the packets are displayed. Which action resolves this issue?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An engineer is investigating connectivity problems on Cisco Firepower that is using service group tags. Specific devices are not being tagged correctly, which is preventing clients from using the proper policies when going through the firewall How is this issue resolved?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?
정답: D
A network engineer must configure an existing firewall to have a NAT configuration. The new configuration must support more than two interfaces per context. The firewall has previously been operating in transparent mode. The Cisco Secure Firewall Threat Defense (FTD) device has been deregistered from Cisco Secure Firewall Management Center (FMC). Which set of configuration actions must the network engineer take next to meet the requirements?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which description of a correlation policy configuration in the Cisco Firepower Management Center is true?
정답: D
What is a purpose of the network analysis policy on a Cisco Firepower NGIPS?
정답: C
Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)
정답: A,E
설명: (DumpTOP 회원만 볼 수 있음)
An engineer configures an access control rule that deploys file policy configurations to security zone or tunnel zones, and it causes the device to restart. What is the reason for the restart?
정답: A
설명: (DumpTOP 회원만 볼 수 있음)