QUESTION 106
An organization is setting up two new Cisco FTD devices to replace their current firewalls and cannot have any network downtime. During the setup process, the synchronization between the two devices is failing.
What action is needed to resolve this issue?
A.Confirm that both devices have the same port-channel numbering
B.Confirm that both devices are running the same software version
C.Confirm that both devices are configured with the same types of interfaces
D.Confirm that both devices have the same flash memory sizes
Answer: D
QUESTION 107
There is an increased amount of traffic on the network and for compliance reasons, management needs visibility into the encrypted traffic.
What is a result of enabling TLS'SSL decryption to allow this visibility?
A.It prompts the need for a corporate managed certificate
B.It has minimal performance impact
C.It is not subject to any Privacy regulations
D.It will fail if certificate pinning is not enforced
Answer: A
QUESTION 108
An organization wants to secure traffic from their branch office to the headquarter building using Cisco Firepower devices, They want to ensure that their Cisco Firepower devices are not wasting resources on inspecting the VPN traffic. What must be done to meet these requirements?
A.Configure the Cisco Firepower devices to ignore the VPN traffic using prefilter policies
B.Enable a flexconfig policy to re-classify VPN traffic so that it no longer appears as interesting traffic
C.Configure the Cisco Firepower devices to bypass the access control policies for VPN traffic.
D.Tune the intrusion policies in order to allow the VPN traffic through without inspection
Answer: C
QUESTION 109
A network administrator is seeing an unknown verdict for a file detected by Cisco FTD.
Which malware policy configuration option must be selected in order to further analyse the file in the Talos cloud?
A.Spero analysis
B.Malware analysis
C.Dynamic analysis
D.Sandbox analysis
Answer: C
QUESTION 110
An engineer has been tasked with providing disaster recovery for an organization's primary Cisco FMC. What must be done on the primary and secondary Cisco FMCs to ensure that a copy of the original corporate policy is available if the primary Cisco FMC fails?
A.Configure high-availability in both the primary and secondary Cisco FMCs
B.Connect the primary and secondary Cisco FMC devices with Category 6 cables of not more than 10 meters in length.
C.Place the active Cisco FMC device on the same trusted management network as the standby device
D.Restore the primary Cisco FMC backup configuration to the secondary Cisco FMC device when the primary device fails
Answer: A
QUESTION 111
An engineer is attempting to add a new FTD device to their FMC behind a NAT device with a NAT ID of ACME001 and a password of Cisco388267669.
Which command set must be used in order to accomplish this?
A.configure manager add ACME001 <registration key> <FMC IP>
B.configure manager add <FMC IP> ACME0O1 <registration key>
C.configure manager add DONTRESOLVE <FMC IP> AMCE001 <registration key>
D.configure manager add <FMC IP> registration key> ACME001
Answer: D
QUESTION 112
Refer to the exhibit. An organization has an access control rule with the intention of sending all social media traffic for inspection. After using the rule for some time, the administrator notices that the traffic is not being inspected, but is being automatically allowed.
What must be done to address this issue?

A.Modify the selected application within the rule
B.Change the intrusion policy to connectivity over security.
C.Modify the rule action from trust to allow
D.Add the social network URLs to the block list
Answer: C
QUESTION 113
A user within an organization opened a malicious file on a workstation which in turn caused a ransomware attack on the network.
What should be configured within the Cisco FMC to ensure the file is tested for viruses on a sandbox system?
A.Capacity handling
B.Local malware analysis
C.Spere analysis
D.Dynamic analysis
Answer: D
QUESTION 114
An engineer configures a network discovery policy on Cisco FMC. Upon configuration, it is noticed that excessive and misleading events filing the database and overloading the Cisco FMC. A monitored NAT device is executing multiple updates of its operating system in a short period of time. What configuration change must be made to alleviate this issue?
A.Leave default networks.
B.Change the method to TCP/SYN.
C.Increase the number of entries on the NAT device.
D.Exclude load balancers and NAT devices.
Answer: D
QUESTION 115
administrator is configuring SNORT inspection policies and is seeing failed deployment messages in Cisco FMC.
What information should the administrator generate for Cisco TAC to help troubleshoot?
A.A Troubleshoot" file for the device in question.
B.A "show tech" file for the device in question
C.A "show tech" for the Cisco FMC.
D.A "troubleshoot" file for the Cisco FMC
Answer: D
QUESTION 117
A network engineer is receiving reports of users randomly getting disconnected from their corporate applications which traverses the data center FTD appliance Network monitoring tools show that the FTD appliance utilization is peaking above 90% of total capacity. What must be done in order to further analyze this issue?
A.Use the Packet Export feature to save data onto external drives
B.Use the Packet Capture feature to collect real-time network traffic
C.Use the Packet Tracer feature for traffic policy analysis
D.Use the Packet Analysis feature for capturing network data
Answer: B
QUESTION 118
IT management is asking the network engineer to provide high-level summary statistics of the Cisco FTD appliance in the network. The business is approaching a peak season so the need to maintain business uptime is high. Which report type should be used to gather this information?
A.Malware Report
B.Standard Report
C.SNMP Report
D.Risk Report
Answer: D
QUESTION 119
Refer to the exhibit. An administrator is looking at some of the reporting capabilities for Cisco Firepower and noticed this section of the Network Risk report showing a lot of SSL activity that cloud be used for evasion. Which action will mitigate this risk?

A.Use SSL decryption to analyze the packets.
B.Use encrypted traffic analytics to detect attacks
C.Use Cisco AMP for Endpoints to block all SSL connection
D.Use Cisco Tetration to track SSL connections to servers.
Answer: A
QUESTION 120
An administrator is setting up Cisco Firepower to send data to the Cisco Stealthwatch appliances. The NetFlow_Set_Parameters object is already created, but NetFlow is not being sent to the flow collector. What must be done to prevent this from occurring?
A.Add the NetFlow_Send_Destination object to the configuration
B.Create a Security Intelligence object to send the data to Cisco Stealthwatch
C.Create a service identifier to enable the NetFlow service
D.Add the NetFlow_Add_Destination object to the configuration
Answer: D
QUESTION 121
With a recent summer time change, system logs are showing activity that occurred to be an hour behind real time. Which action should be taken to resolve this issue?
A.Manually adjust the time to the correct hour on all managed devices
B.Configure the system clock settings to use NTP with Daylight Savings checked
C.Manually adjust the time to the correct hour on the Cisco FMC.
D.Configure the system clock settings to use NTP
Answer: D
QUESTION 122
A network administrator notices that SI events are not being updated The Cisco FTD device is unable to load all of the SI event entries and traffic is not being blocked as expected.
What must be done to correct this issue?
A.Restart the affected devices in order to reset the configurations
B.Manually update the SI event entries to that the appropriate traffic is blocked
C.Replace the affected devices with devices that provide more memory
D.Redeploy configurations to affected devices so that additional memory is allocated to the SI module
Answer: D
QUESTION 123
Refer to the exhibit. What must be done to fix access to this website while preventing the same communication to all other websites?

A.Create an intrusion policy rule to have Snort allow port 80 to only 172.1.1.50.
B.Create an intrusion policy rule to have Snort allow port 443 to only 172.1.1.50.
C.Create an access control policy rule to allow port 443 to only 172.1.1.50.
D.Create an access control policy rule to allow port 80 to only 172.1.1.50.
Answer: D
QUESTION 124
A network administrator discovers that a user connected to a file server and downloaded a malware file. The Cisc FMC generated an alert for the malware event, however the user still remained connected. Which Cisco APM file rule action within the Cisco FMC must be set to resolve this issue?
A.Detect Files
B.Malware Cloud Lookup
C.Local Malware Analysis
D.Reset Connection
Answer: D
QUESTION 125
Which feature within the Cisco FMC web interface allows for detecting, analyzing and blocking malware in network traffic?
A.intrusion and file events
B.Cisco AMP for Endpoints
C.Cisco AMP for Networks
D.file policies
Answer: C
QUESTION 126
Which license type is required on Cisco ISE to integrate with Cisco FMC pxGrid?
A.mobility
C.base
D.apex
Answer: C
QUESTION 127
A network engineer wants to add a third-party threat feed into the Cisco FMC for enhanced threat detection Which action should be taken to accomplish this goal?
A.Enable Threat Intelligence Director using STIX and TAXII
B.Enable Rapid Threat Containment using REST APIs
C.Enable Threat Intelligence Director using REST APIs
D.Enable Rapid Threat Containment using STIX and TAXII
Answer: A
QUESTION 128
What is a feature of Cisco AMP private cloud?
A.It supports anonymized retrieval of threat intelligence
B.It supports security intelligence filtering.
C.It disables direct connections to the public cloud.
D.It performs dynamic analysis
Answer: C
QUESTION 129
An engineer has been tasked with using Cisco FMC to determine if files being sent through the network are malware.
Which two configuration tasks must be performed to achieve this file lookup? (Choose two.)
A.The Cisco FMC needs to include a SSL decryption policy.
B.The Cisco FMC needs to connect to the Cisco AMP for Endpoints service.
C.The Cisco FMC needs to connect to the Cisco ThreatGrid service directly for sandboxing.
D.The Cisco FMC needs to connect with the FireAMP Cloud.
E.The Cisco FMC needs to include a file inspection policy for malware lookup.
Answer: AE
QUESTION 130
An organization is using a Cisco FTD and Cisco ISE to perform identity-based access controls. A network administrator is analyzing the Cisco FTD events and notices that unknown user traffic is being allowed through the firewall.
How should this be addressed to block the traffic while allowing legitimate user traffic?
A.Modify the Cisco ISE authorization policy to deny this access to the user.
B.Modify Cisco ISE to send only legitimate usernames to the Cisco FTD.
C.Add the unknown user in the Access Control Policy in Cisco FTD.
D.Add the unknown user in the Malware & File Policy in Cisco FTD.
Answer: C
QUESTION 131
An engineer is restoring a Cisco FTD configuration from a remote backup using the command restore remote-manager-backup location 1.1.1.1 admin /volume/home/admin BACKUP_Cisc394602314.zip on a Cisco FMG. After connecting to the repository, an error occurred that prevents the FTD device from accepting the backup file. What is the problem?
A.The backup file is not in .cfg format.
B.The backup file is too large for the Cisco FTD device
C.The backup file extension was changed from tar to zip
D.The backup file was not enabled prior to being applied
Answer: C
QUESTION 132
A network engineer is logged into the Cisco AMP for Endpoints console and sees a malicious verdict for an identified SHA-256 hash. Which configuration is needed to mitigate this threat?
A.Add the hash to the simple custom deletion list.
B.Use regular expressions to block the malicious file.
C.Enable a personal firewall in the infected endpoint.
D.Add the hash from the infected endpoint to the network block list.
Answer: A
QUESTION 133
A network engineer implements a new Cisco Firepower device on the network to take advantage of its intrusion detection functionality. There is a requirement to analyze the traffic going across the device, alert on any malicious traffic, and appear as a bump in the wire How should this be implemented?
A.Specify the BVl IP address as the default gateway for connected devices.
B.Enable routing on the Cisco Firepower
C.Add an IP address to the physical Cisco Firepower interfaces.
D.Configure a bridge group in transparent mode.
Answer: D
QUESTION 134
An organization has a Cisco IPS running in inline mode and is inspecting traffic for malicious activity. When traffic is received by the Cisco IRS, if it is not dropped, how does the traffic get to its destination?
A.It is retransmitted from the Cisco IPS inline set.
B.The packets are duplicated and a copy is sent to the destination.
C.It is transmitted out of the Cisco IPS outside interface.
D.It is routed back to the Cisco ASA interfaces for transmission.
Answer: A
QUESTION 135
A network administrator is concerned about the high number of malware files affecting users' machines. What must be done within the access control policy in Cisco FMC to address this concern?
A.Create an intrusion policy and set the access control policy to block.
B.Create an intrusion policy and set the access control policy to allow.
C.Create a file policy and set the access control policy to allow.
D.Create a file policy and set the access control policy to block.
Answer: C
QUESTION 136
An engineer is investigating connectivity problems on Cisco Firepower that is using service group tags. Specific devices are not being tagged correctly, which is preventing clients from using the proper policies when going through the firewall How is this issue resolved?
A.Use traceroute with advanced options.
B.Use Wireshark with an IP subnet filter.
C.Use a packet capture with match criteria.
D.Use a packet sniffer with correct filtering
Answer: C
2022 Latest Braindump2go 300-710 PDF and 300-710 VCE Dumps Free Share: