Big Cyber Monday Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

300-710 Securing Networks with Cisco Firepower (300-710 SNCF) Questions and Answers

Questions 4

An engineer is configuring multiple Cisco FTD appliances (or use in the network. Which rule must the engineer follow while defining interface objects in Cisco FMC for use with interfaces across multiple devices?

Options:

A.

An interface cannot belong to a security zone and an interface group

B.

Interface groups can contain multiple interface types

C.

Interface groups can contain interfaces from many devices.

D.

Two security zones can contain the same interface

Buy Now
Questions 5

An engineer must configure high availability for the Cisco Firepower devices. The current network topology does not allow for two devices to pass traffic concurrently. How must the devices be implemented in this environment?

Options:

A.

in active/active mode

B.

in a cluster span EtherChannel

C.

in active/passive mode

D.

in cluster interface mode

Buy Now
Questions 6

A cisco Secure firewall Threat Defence device is configured in inline IPS mode to inspect all traffic that passes through the interfaces in the inline set. Which setting in the inline set configuration must be connected to allow traffic to pass through uninterrupted when VDB updates are being applied?

Options:

A.

Propagate Link State

B.

Short Fall Open

C.

Strict TCP Enforcement

D.

Tap Mode

Buy Now
Questions 7

An engineer must define a URL object on Cisco FMC. What is the correct method to specify the URL without performing SSL inspection?

Options:

A.

Use Subject Common Name value.

B.

Specify all subdomains in the object group.

C.

Specify the protocol in the object.

D.

Include all URLs from CRL Distribution Points.

Buy Now
Questions 8

An engineer wants to perform a packet capture on the Cisco FTD to confirm that the host using IP address 192 168.100.100 has the MAC address of 0042 7734.103 to help troubleshoot aconnectivity issue What is the correct tcpdump command syntax to ensure that the MAC address appears in the packet capture output?

Options:

A.

-nm src 192.168.100.100

B.

-ne src 192.168.100.100

C.

-w capture.pcap -s 1518 host 192.168.100.100 mac

D.

-w capture.pcap -s 1518 host 192.168.100.100 ether

Buy Now
Questions 9

There is an increased amount of traffic on the network and for compliance reasons, management needs visibility into the encrypted traffic What is a result of enabling TLS'SSL decryption to allow this visibility?

Options:

A.

It prompts the need for a corporate managed certificate

B.

It has minimal performance impact

C.

It is not subject to any Privacy regulations

D.

It will fail if certificate pinning is not enforced

Buy Now
Questions 10

An engineer currently has a Cisco FTD device registered to the Cisco FMC and is assigned the address of 10 10.50.12. The organization is upgrading the addressing schemes and there is a requirement to convert the addresses to a format that provides an adequate amount of addresses on the network What should the engineer do to ensure that the new addressing takes effect and can be used for the Cisco FTD to Cisco FMC connection?

Options:

A.

Delete and reregister the device to Cisco FMC

B.

Update the IP addresses from IFV4 to IPv6 without deleting the device from Cisco FMC

C.

Format and reregister the device to Cisco FMC.

D.

Cisco FMC does not support devices that use IPv4 IP addresses.

Buy Now
Questions 11

An engineer is investigating connectivity problems on Cisco Firepower for a specific SGT. Which command allows the engineer to capture real packets that pass through the firewall using an SGT of 64?

Options:

A.

capture CAP type inline-tag 64 match ip any any

B.

capture CAP match 64 type inline-tag ip any any

C.

capture CAP headers-only type inline-tag 64 match ip any any

D.

capture CAP buffer 64 match ip any any

Buy Now
Questions 12

Network users are experiencing Intermittent issues with internet access. An engineer ident med mat the issue Is being caused by NAT exhaustion. How must the engineer change the dynamic NAT configuration to provide internet access for more users without running out of resources?

Options:

A.

Define an additional static NAT for the network object in use.

B.

Configure fallthrough to interface PAT on 'he Advanced tab.

C.

Convert the dynamic auto NAT rule to dynamic manual NAT.

D.

Add an identity NAT rule to handle the overflow of users.

Buy Now
Questions 13

Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choosetwo.)

Options:

A.

OSPFv2 with IPv6 capabilities

B.

virtual links

C.

SHA authentication to OSPF packets

D.

area boundary router type 1 LSA filtering

E.

MD5 authentication to OSPF packets

Buy Now
Questions 14

A security engineer needs to configure a network discovery policy on a Cisco FMC appliance and prevent excessive network discovery events from overloading the FMC database? Which action must be taken to accomplish this task?

Options:

A.

Change the network discovery method to TCP/SYN.

B.

Configure NetFlow exporters for monitored networks.

C.

Monitor only the default IPv4 and IPv6 network ranges.

D.

Exclude load balancers and NAT devices in the policy.

Buy Now
Questions 15

An engineer must permit SSH on the inside interface of a Cisco Secure Firewall Threat Defense device. SSH is currently permitted only on the management interface. Which type of policy

must the engineer configure?

Options:

A.

platform policy

B.

access control policy

C.

NAT policy

D.

intrusion policy

Buy Now
Questions 16

A network engineer detects a connectivity issue between Cisco Secure Firewall Management Center and Cisco Secure Firewall Threat Defense. Initial troubleshooting indicates that heartbeats and events are not being received. The engineer re-establishes the secure channels between both peers. Which two commands must the engineer run to resolve the issue? (Choose two.)

Options:

A.

show disk-manager

B.

show history

C.

sudo stats_unified.pl

D.

manage_procs.pl

E.

sudo perfstats -Cq < /var/sf/rna/correlator-stats/now

Buy Now
Questions 17

An engineer has been tasked with using Cisco FMC to determine if files being sent through the network are malware. Which two configuration tasks must be performed to achieve this file lookup? (Choose two).

Options:

A.

The Cisco FMC needs to include a SSL decryption policy.

B.

The Cisco FMC needs to connect to the Cisco AMP for Endpoints service.

C.

The Cisco FMC needs to connect to the Cisco ThreatGrid service directly for sandboxing.

D.

The Cisco FMC needs to connect with the FireAMP Cloud.

E.

The Cisco FMC needs to include a file inspection policy for malware lookup.

Buy Now
Questions 18

When using Cisco Threat Response, which phase of the Intelligence Cycle publishes the results of the investigation?

Options:

A.

direction

B.

dissemination

C.

processing

D.

analysis

Buy Now
Questions 19

An engineer must create a basic access control policy in the Cisco Secure Firewall Management Center to block all traffic by default. Drag and drop the configuration actions from the left into sequence on the right.

300-710 Question 19

Options:

Buy Now
Questions 20

Which Cisco Firepower rule action displays an HTTP warning page?

Options:

A.

Monitor

B.

Block

C.

Interactive Block

D.

Allow with Warning

Buy Now
Questions 21

What is the result of specifying of QoS rule that has a rate limit that is greater than the maximum throughput of an interface?

Options:

A.

The rate-limiting rule is disabled.

B.

Matching traffic is not rate limited.

C.

The system rate-limits all traffic.

D.

The system repeatedly generates warnings.

Buy Now
Questions 22

A network engineer implements a new Cisco Firepower device on the network to take advantage of its intrusion detection functionality. There is a requirement to analyze the traffic going across the device, alert on any malicious traffic, and appear as a bump in the wire How should this be implemented?

Options:

A.

Specify the BVl IP address as the default gateway for connected devices.

B.

Enable routing on the Cisco Firepower

C.

Add an IP address to the physical Cisco Firepower interfaces.

D.

Configure a bridge group in transparent mode.

Buy Now
Questions 23

An engineer must deploy a Cisco FTD device. Management wants to examine traffic without requiring network changes that will disrupt end users. Corporate security policy requires the separation of management traffic from data traffic and the use of SSH over Telnet for remote administration. How must the device be deployed to meet these requirements?

Options:

A.

in routed mode with a diagnostic interface

B.

in transparent mode with a management Interface

C.

in transparent made with a data interface

D.

in routed mode with a bridge virtual interface

Buy Now
Questions 24

An engineer is configuring two new Cisco Secure Firewall Threat Defense devices to replace the existing firewalls. Network traffic must be analyzed for intrusion events without impacting the traffic. What must the engineer implement next to accomplish the goal?

Options:

A.

Passive mode

B.

Inline Pair in Tap mode

C.

ERSPAN Passive mode

D.

Inline Pair mode

Buy Now
Questions 25

Which two packet captures does the FTD LINA engine support? (Choose two.)

Options:

A.

Layer 7 network ID

B.

source IP

C.

application ID

D.

dynamic firewall importing

E.

protocol

Buy Now
Questions 26

A network security engineer must replace a faulty Cisco FTD device in a high availability pair. Which action must be taken while replacing the faulty unit?

Options:

A.

Shut down the Cisco FMC before powering up the replacement unit.

B.

Ensure that the faulty Cisco FTD device remains registered to the Cisco FMC.

C.

Unregister the faulty Cisco FTD device from the Cisco FMC

D.

Shut down the active Cisco FTD device before powering up the replacement unit.

Buy Now
Questions 27

A network administrator wants to block traffictoa known malware site athttps://www.badsite.comand all subdomains while ensuring no packets from any internal client are sent to that site. Which type of policy must the network administrator use to accomplish this goal?

Options:

A.

Prefilter policy

B.

SSL policy

C.

DNS policy

D.

Access Control policy with URL filtering

Buy Now
Questions 28

An engineer is troubleshooting a device that cannot connect to a web server. The connection is initiated from the Cisco FTD inside interface and attempting to reach 10.0.1.100 over the non-standard port of 9443 The host the engineer is attempting the connection from is at the IP address of 10.20.10.20. In order to determine what is happening to the packets on the network, the engineer decides to use the FTD packet capture tool Which capture configuration should be used to gather the information needed to troubleshoot this issue?

A)

300-710 Question 28

B)

C)

300-710 Question 28

D)

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 29

A security engineer is configuring a remote Cisco FTD that has limited resources and internet bandwidth. Which malware action and protection option should be configured to reduce the requirement for cloud lookups?

Options:

A.

Malware Cloud Lookup and dynamic analysis

B.

Block Malware action and dynamic analysis

C.

Block Malware action and local malware analysis

D.

Block File action and local malware analysis

Buy Now
Questions 30

A network administrator is configuring an FTD in transparent mode. A bridge group is set up and an access policy has been set up to allow all IP traffic. Traffic is not passing through the FTD. What additional configuration is needed?

Options:

A.

The security levels of the interfaces must be set.

B.

A default route must be added to the FTD.

C.

An IP address must be assigned to the BVI.

D.

A mac-access control list must be added to allow all MAC addresses.

Buy Now
Questions 31

A network administrator is deploying a Cisco IPS appliance and needs it to operate initially without affecting traffic flows.

It must also collect data to provide a baseline of unwanted traffic before being reconfigured to drop it. Which Cisco IPS mode meets these requirements?

Options:

A.

failsafe

B.

inline tap

C.

promiscuous

D.

bypass

Buy Now
Questions 32

A network administrator notices that inspection has been interrupted on all non-managed interfaces of a device. What is the cause of this?

Options:

A.

The value of the highest MTU assigned to any non-management interface was changed.

B.

The value of the highest MSS assigned to any non-management interface was changed.

C.

A passive interface was associated with a security zone.

D.

Multiple inline interface pairs were added to the same inline interface.

Buy Now
Questions 33

An administrator is working on a migration from Cisco ASA to the Cisco FTD appliance and needs to test the rules without disrupting the traffic. Which policy type should be used to configure the ASA rules during this phase of the migration?

Options:

A.

identity

B.

Intrusion

C.

Access Control

D.

Prefilter

Buy Now
Questions 34

A Cisco FMC administrator wants to configure fastpathing of trusted network traffic to increase performance. In which type of policy would the administrator configure this feature?

Options:

A.

Identity policy

B.

Prefilter policy

C.

Network Analysis policy

D.

Intrusion policy

Buy Now
Questions 35

A network engineer must monitor threat events from the console of Cisco Secure Firewall Management Center. The engineer integrates the Cisco Secure Firewall Malware Defense in Secure Firewall Management Center. Which action must the engineer take next?

Options:

A.

Log in to Cisco Secure Endpoint, click Allow to authorize the Secure Firewall Malware Defense to Secure FMC connection, and add a Secure Firewall Malware Defense cloud connection to Secure FMC.

B.

Log in to Secure Endpoint, click Allow to authorize the Secure Firewall Malware Defense to Secure FMC connection, add a Secure Firewall Malware Defense cloud connection to Secure FMC, and select the Secure Firewall Malware Defense cloud for Secure Endpoint.

C.

Add a Secure Firewall Malware Defense cloud connection in Secure FMC, log in to Secure Endpoint, and click Allow to authorize the Secure Firewall Malware Defense to Secure FMC connection.

D.

Add a Secure Firewall Malware Defense cloud connection in Secure FMC, select the Secure Firewall Malware Defense cloud for Secure Endpoint, log in to Secure Endpoint, and click Allow to authorize the Secure Firewall Malware Defense to Secure FMC connection.

Buy Now
Questions 36

Refer to the exhibit.

An engineer is modifying an access control policy to add a rule to Inspect all DNS traffic that passes it making the change and deploying the policy, they see that DNS traffic Is not being Inspected by the Snort engine. What is......

Options:

A.

The action of the rule is set to trust instead of allow.

B.

The rule must specify the security zone that originates the traffic.

C.

The rule Is configured with the wrong setting for the source port.

D.

The rule must define the source network for inspection as well as the port.

Buy Now
Questions 37

An administrator is optimizing the Cisco FTD rules to improve network performance, and wants to bypass inspection for certain traffic types to reduce the load on the Cisco FTD. Which policy must be configured to accomplish this goal?

Options:

A.

prefilter

B.

intrusion

C.

identity

D.

URL filtering

Buy Now
Questions 38

How should a high-availability pair of Cisco Secure Firewall Threat Defense Virtual appliances be deployed to Cisco Secure Firewall Management Center?

Options:

A.

Configure high availability first, then add only the primary Cisco Secure Firewall Threat Defense Virtual appliance to Cisco Secure Firewall Management Center.

B.

Add the primary and secondary Cisco Secure Firewall Threat Defense Virtual appliances to Cisco Secure Firewall Management Center first, then configure high availability.

C.

Add the primary appliance to Cisco Secure Firewall Management Center first, then configure high availability.

D.

Configure high availability first, then add the primary and secondary appliances to Cisco Secure Firewall Management Center.

Buy Now
Questions 39

An engineer integrates Cisco FMC and Cisco ISE using pxGrid. Which role is assigned for Cisco FMC?

Options:

A.

controller

B.

publisher

C.

client

D.

server

Buy Now
Questions 40

A network administrator is configuring a Cisco AMP public cloud instance and wants to capture infections and polymorphic variants of a threat to help detect families of malware. Which detection engine meets this requirement?

Options:

A.

RBAC

B.

Tetra

C.

Ethos

D.

Spero

Buy Now
Questions 41

An engineer is configuring Cisco FMC and wants to limit the time allowed for processing packets through the interface However if the time is exceeded the configuration must allow packets to bypass detection What must be configured on the Cisco FMC to accomplish this task?

Options:

A.

Fast-Path Rules Bypass

B.

Cisco ISE Security Group Tag

C.

Inspect Local Traffic Bypass

D.

Automatic Application Bypass

Buy Now
Questions 42

What is a feature of Cisco AMP private cloud?

Options:

A.

It supports anonymized retrieval of threat intelligence

B.

It supports security intelligence filtering.

C.

It disables direct connections to the public cloud.

D.

It performs dynamic analysis

Buy Now
Questions 43

Which CLI command is used to generate firewall debug messages on a Cisco Firepower?

Options:

A.

system support firewall-engine-debug

B.

system support ssl-debug

C.

system support platform

D.

system support dump-table

Buy Now
Questions 44

What is the advantage of having Cisco Firepower devices send events to Cisco Threat response via the security services exchange portal directly as opposed to using syslog?

Options:

A.

Firepower devices do not need to be connected to the internet.

B.

All types of Firepower devices are supported.

C.

Supports all devices that are running supported versions of Firepower

D.

An on-premises proxy server does not need to set up and maintained

Buy Now
Questions 45

Which two conditions must be met to enable high availability between two Cisco FTD devices? (Choose two.)

Options:

A.

same flash memory size

B.

same NTP configuration

C.

same DHCP/PPoE configuration

D.

same host name

E.

same number of interfaces

Buy Now
Questions 46

An engineer must configure a Cisco FMC dashboard in a child domain. Which action must be taken so that the dashboard is visible to the parent domain?

Options:

A.

Add a separate tab.

B.

Adjust policy inheritance settings.

C.

Add a separate widget.

D.

Create a copy of the dashboard.

Buy Now
Questions 47

A security engineer found a suspicious file from an employee email address and is trying to upload it for analysis, however the upload is failing. The last registration status is still active. What is the cause for this issue?

Options:

A.

Cisco AMP for Networks is unable to contact Cisco Threat Grid on premise.

B.

Cisco AMP for Networks is unable to contact Cisco Threat Grid Cloud.

C.

There is a host limit set.

D.

The user agent status is set to monitor.

Buy Now
Questions 48

A network administrator needs to create a policy on Cisco Firepower to fast-path traffic to avoid Layer 7 inspection. The rate at which traffic is inspected must be optimized. What must be done to achieve this goal?

Options:

A.

Enable lhe FXOS for multi-instance.

B.

Configure a prefilter policy.

C.

Configure modular policy framework.

D.

Disable TCP inspection.

Buy Now
Questions 49

A network engineer must provide redundancy between two Cisco FTD devices. The redundancy configuration must include automatic configuration, translation, and connection updates. After the initial configuration of the two appliances, which two steps must be taken to proceed with the redundancy configuration? (Choose two.)

Options:

A.

Configure the virtual MAC address on the failover link.

B.

Disable hellos on the inside interface.

C.

Configure the standby IP addresses.

D.

Ensure the high availability license is enabled.

E.

Configure the failover link with stateful properties.

Buy Now
Questions 50

An engineer must integrate a thud-party security Intelligence teed with Cisco Secure Firewall Management Center. Secure Firewall Management Center is running Version 6.2 3 and has 8 GB of memory. Which two actions must be taken to implement Throat Intelligence Director? (Choose two.)

Options:

A.

Upgrade to version 6.6.

B.

Enable REST API access.

C.

Add the URL of the TAXII server.

D.

Add 7 GB of memory.

E.

Add a TAXII server

Buy Now
Questions 51

Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?

Options:

A.

Child domains can view but not edit dashboards that originate from an ancestor domain.

B.

Child domains have access to only a limited set of widgets from ancestor domains.

C.

Only the administrator of the top ancestor domain can view dashboards.

D.

Child domains cannot view dashboards that originate from an ancestor domain.

Buy Now
Questions 52

A software development company hosts the website http:dev.company.com for contractors to share code for projects they are working on with internal developers. The web server is on premises and is protected by a Cisco Secure Firewall Threat Defense appliance. The network administrator is worried about someone trying to transmit infected files to internal users via this site. Which type of policy must be able associated with an access control policy to enable Cisco Secure Firewall Malware Defense to detect and block malware?

Options:

A.

SSL policy

B.

Prefilter policy

C.

File policy

D.

Network discovery policy

Buy Now
Questions 53

An organization is using a Cisco FTD and Cisco ISE to perform identity-based access controls. A network administrator is analyzing the Cisco FTD events and notices that unknown user traffic is being allowed through the firewall. How should this be addressed to block the traffic while allowing legitimate user traffic?

Options:

A.

Modify the Cisco ISE authorization policy to deny this access to the user.

B.

Modify Cisco ISE to send only legitimate usernames to the Cisco FTD.

C.

Add the unknown user in the Access Control Policy in Cisco FTD.

D.

Add the unknown user in the Malware & File Policy in Cisco FTD.

Buy Now
Questions 54

An engineer is setting up a new Cisco Secure Firewall Threat Defense appliance to replace the current firewall. The company requests that inline sets be used and that when one interface in

an inline set goes down, the second interface in the inline set goes down. What must the engineer configure to meet the deployment requirements?

Options:

A.

strict TCP enforcement

B.

propagate link state

C.

Snort fail open

D.

inline tap mode

Buy Now
Questions 55

300-710 Question 55

Refer to the exhibit An engineer is modifying an access control pokey to add a rule to inspect all DNS traffic that passes through the firewall After making the change and deploying thepokey they see that DNS traffic is not bang inspected by the Snort engine What is the problem?

Options:

A.

The rule must specify the security zone that originates the traffic

B.

The rule must define the source network for inspection as well as the port

C.

The action of the rule is set to trust instead of allow.

D.

The rule is configured with the wrong setting for the source port

Buy Now
Questions 56

A network administrator is reviewing a monthly advanced malware risk report and notices a host that Is listed as CnC Connected. Where must the administrator look within Cisco FMC to further determine if this host is infected with malware?

Options:

A.

Analysis > Hosts > indications of Compromise

B.

Analysts > Files > Malware Events

C.

Analysis > Hosts > Host Attributes

D.

Analysis > Flies > Network File Trajectory

Buy Now
Questions 57

An engineer attempts to pull the configuration for a Cisco FTD sensor to review with Cisco TAC but does not have direct access to the CU for the device. The CLl for the device is managed by Cisco FMC to which the engineer has access. Which action in Cisco FMC grants access to the CLl for the device?

Options:

A.

Export the configuration using the Import/Export tool within Cisco FMC.

B.

Create a backup of the configuration within the Cisco FMC.

C.

Use the show run all command in the Cisco FTD CLI feature within Cisco FMC.

D.

Download the configuration file within the File Download section of Cisco FMC.

Buy Now
Questions 58

An engineer is integrating Cisco Secure Endpoint with Cisco Secure Firewall Management Center in high availability mode. Malware events detected by Secure Endpoint must also be

received by Secure Firewall Management Center and public cloud services are used. Which two configurations must be selected on both high availability peers independently? (Choose two.)

Options:

A.

internet connection

B.

Smart Software Manager Satellite

C.

Cisco Success Network

D.

security group tag

E.

Secure Endpoint Cloud Connection

Buy Now
Questions 59

An engineer is configuring a custom intrusion rule on Cisco FMC. The engineer needs the rule to search the payload or stream for the string "|45 5* 26 27 4 0A|*. Which Keyword must the engineer use with this stung lo create an argument for packed inspection?

Options:

A.

metadata

B.

Content

C.

Protected _ content

D.

data

Buy Now
Questions 60

An engineer configures a network discovery policy on Cisco FMC. Upon configuration, it is noticed that excessive and misleading events filing the database and overloading the Cisco FMC. A monitored NAT device is executing multiple updates of its operating system in a short period of time. What configurationchange must be made to alleviate this issue?

Options:

A.

Leave default networks.

B.

Change the method to TCP/SYN.

C.

Increase the number of entries on the NAT device.

D.

Exclude load balancers and NAT devices.

Buy Now
Questions 61

Which feature sets up multiple interfaces on a Cisco Secure Firewall Threat Defense to be on the same subnet?

Options:

A.

EtherChannel

B.

SVI

C.

BVI

D.

security levels

Buy Now
Questions 62

What is the difference between inline and inline tap on Cisco Firepower?

Options:

A.

Inline tap mode can send a copy of the traffic to another device.

B.

Inline tap mode does full packet capture.

C.

Inline mode cannot do SSL decryption.

D.

Inline mode can drop malicious traffic.

Buy Now
Questions 63

A company is in the process of deploying intrusion prevention with Cisco FTDs managed by a Cisco FMC. An engineer must configure policies to detect potential intrusions but not block the suspicious traffic. Which action accomplishes this task?

Options:

A.

Configure IDS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by unchecking the "Drop when inline" option.

B.

Configure IPS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by checking the "Drop when inline" option.

C.

Configure IPS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by unchecking the "Drop when inline" option.

D.

Configure IDS mode when creating or editing a policy rule under the Cisco FMC Intrusion tab in Access Policies section by checking the "Drop when inline" option.

Buy Now
Questions 64

A network administrator notices that remote access VPN users are not reachable from inside the network. It is determined that routing is configured correctly, however return traffic is entering the firewall but not leaving it What is the reason for this issue?

Options:

A.

A manual NAT exemption rule does not exist at the top of the NAT table.

B.

An external NAT IP address is not configured.

C.

An external NAT IP address is configured to match the wrong interface.

D.

An object NAT exemption rule does not exist at the top of the NAT table.

Buy Now
Questions 65

Which action must be taken on the Cisco FMC when a packet bypass is configured in case the Snort engine is down or a packet takes too long to process?

Options:

A.

Enable Inspect Local Router Traffic

B.

Enable Automatic Application Bypass

C.

Configure Fastpath rules to bypass inspection

D.

Add a Bypass Threshold policy for failures

Buy Now
Questions 66

An engineer must configure email notifications on Cisco Secure Firewall Management Center. TLS encryption must be used to protect the messages from unauthorized access. The engineer adds the IP address of the mail relay host and must set the port number. Which TCP port must the engineer use?

Options:

A.

25

B.

389

C.

465

D.

587

Buy Now
Questions 67

When a Cisco FTD device is configured in transparent firewall mode, on which two interface types can an IP address be configured? (Choose two.)

Options:

A.

Diagnostic

B.

EtherChannel

C.

BVI

D.

Physical

E.

Subinterface

Buy Now
Questions 68

Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?

Options:

A.

Windows domain controller

B.

audit

C.

triage

D.

protection

Buy Now
Questions 69

The network administrator wants to enhance the network security posture by enabling machine learning tor malware detection due to a concern with suspicious Microsoft executable file types that were seen while creating monthly security reports for the CIO. Which feature must be enabled to accomplish this goal?

Options:

A.

Spero

B.

dynamic analysis

C.

static analysis

D.

Ethos

Buy Now
Questions 70

An engineer must investigate a connectivity issue from an endpoint behind a Cisco FTD device and a public DNS server. The endpoint cannot perform name resolution queries. Which action must the engineer perform to troubleshoot the issue by simulating real DNS traffic on the Cisco FTD while verifying the Snarl verdict?

Options:

A.

Perform a Snort engine capture using tcpdump from the FTD CLI.

B.

Use the Capture w/Trace wizard in Cisco FMC.

C.

Create a Custom Workflow in Cisco FMC.

D.

Run me system support firewall-engine-debug command from me FTD CLI.

Buy Now
Questions 71

An administrator receives reports that users cannot access a cloud-hosted web server. The access control policy was recently updated with several new policy additions and URL filtering. What must be done to troubleshoot the issue and restore access without sacrificing the organization's security posture?

Options:

A.

Create a new access control policy rule to allow ports 80 and 443 to the FQDN of the web server.

B.

Identify the blocked traffic in the Cisco FMC connection events to validate the block, and modify the policy to allow the traffic to the web server.

C.

Verify the blocks using the packet capture tool and create a rule with the action monitor for the traffic.

D.

Download a PCAP of the traffic attempts to verify the blocks and use the flexconfig objects to create a rule that allows only the required traffic to the destination server.

Buy Now
Questions 72

An engineer has been tasked with providing disaster recovery for an organization's primary Cisco FMC. What must be done on the primary and secondary Cisco FMCs to ensure that a copy of the original corporate policy is available if the primary Cisco FMC fails?

Options:

A.

Restore the primary Cisco FMC backup configuration to the secondary Cisco FMC device when the primary device fails.

B.

Configure high-availability in both the primary and secondary Cisco FMCs.

C.

Connect the primary and secondary Cisco FMC devices with Category 6 cables of not more than 10 meters in length.

D.

Place the active Cisco FMC device on the same trusted management network as the standby device.

Buy Now
Questions 73

An engineer is deploying a Cisco Secure Firewall Management Center appliance. The company must send data to Cisco Secure Network Analytics appliances. Which two actions must the engineer take? (Choose two.)

Options:

A.

Configure Security Intelligence object to send data to Cisco Secure Network Analytics.

B.

Add the Netflow_Send_Destination object to the configuration.

C.

Add the Netflow_Add_Destination object to the configuration.

D.

Add the Netflow_Set_Parameters object to the configuration.

E.

Create a service identifier to enable the NetFlow service.

Buy Now
Questions 74

300-710 Question 74

300-710 Question 74

Refer to the exhibit. A security engineer must improve security in an organization and is producing a risk mitigation strategy to present to management for approval. Which action must the security engineer take based on this Attacks Risk Report?

Options:

A.

Block Internet Explorer.

B.

Block NetBIOS.

C.

Inspect TCP port 80 traffic.

D.

Inspect DNS traffic.

Buy Now
Questions 75

An engineer is monitoring network traffic from their sales and product development departments, which are on two separate networks What must be configured in order to maintain data privacy for both departments?

Options:

A.

Use a dedicated IPS inline set for each department to maintain traffic separation

B.

Use 802 1Q mime set Trunk interfaces with VLANs to maintain logical traffic separation

C.

Use passive IDS ports for both departments

D.

Use one pair of inline set in TAP mode for both departments

Buy Now
Questions 76

What is the RTC workflow when the infected endpoint is identified?

Options:

A.

Cisco ISE instructs Cisco AMP to contain the infected endpoint.

B.

Cisco ISE instructs Cisco FMC to contain the infected endpoint.

C.

Cisco AMP instructs Cisco FMC to contain the infected endpoint.

D.

Cisco FMC instructs Cisco ISE to contain the infected endpoint.

Buy Now
Questions 77

An organization is migrating their Cisco ASA devices running in multicontext mode to Cisco FTD devices. Which action must be taken to ensure that each context on the Cisco ASA is logically separated in the Cisco FTD devices?

Options:

A.

Add a native instance to distribute traffic to each Cisco FTD context.

B.

Add the Cisco FTD device to the Cisco ASA port channels.

C.

Configure a container instance in the Cisco FTD for each context in the Cisco ASA.

D.

Configure the Cisco FTD to use port channels spanning multiple networks.

Buy Now
Questions 78

An engineer must implement Cisco Secure Firewall transparent mode due to a new server recently being added that must communicate with an existing server that is currently separated by the firewall. Which implementation action must be taken next by the engineer to accomplish the goal?

Options:

A.

Enable both servers to share the same VXLAN segment.

B.

Configure the same default gateway for both servers.

C.

Ensure that both servers are in the same bridge domain.

D.

Assign the same subnet to both servers.

Buy Now
Questions 79

An administrator is adding a new URL-based category feed to the Cisco FMC for use within the policies. The intelligence source does not use STIX. but instead uses a .txt file format. Which action ensures that regular updates are provided?

Options:

A.

Add a URL source and select the flat file type within Cisco FMC.

B.

Upload the .txt file and configure automatic updates using the embedded URL.

C.

Add a TAXII feed source and input the URL for the feed.

D.

Convert the .txt file to STIX and upload it to the Cisco FMC.

Buy Now
Questions 80

Which Cisco Rapid Threat Containment mitigation action is enabled by integrating pxGrid Adaptive Network Control with Cisco ISE and Cisco Secure Firewall Management Center?

Options:

A.

Block

B.

Terminate

C.

Suspend

D.

Reject

Buy Now
Questions 81

An engineer is reviewing a ticket that requests to allow traffic for some devices that must connect to a server over 8699/udp. The request mentions only one IP address, 172.16.18.15, but the requestor asked for the engineer to open the port for all machines that have been trying to connect to it over the last week. Which action must the engineer take to troubleshoot this issue?

Options:

A.

Use the context explorer to see the application blocks by protocol.

B.

Use the context explorer to see the destination port blocks

C.

Filter the connection events by the source port 8699/udp.

D.

Filter the connection events by the destination port 8699/udp.

Buy Now
Questions 82

A network administrator is migrating from a Cisco ASA to a Cisco FTD.

EIGRP is configured on the Cisco ASA but it is not available in the Cisco FMC.

Which action must the administrator take to enable this feature on the Cisco FTD?

Options:

A.

Configure EIGRP parameters using FlexConfig objects.

B.

Add the command feature eigrp via the FTD CLI.

C.

Create a custom variable set and enable the feature in the variable set.

D.

Enable advanced configuration options in the FMC.

Buy Now
Questions 83

An engineer defines a new rule while configuring an Access Control Policy. After deploying the policy, the rule is not working as expected and the hit counters associated with the rule are showing zero. What is causing this error?

Options:

A.

Logging is not enabled for the rule.

B.

The rule was not enabled after being created.

C.

The wrong source interface for Snort was selected in the rule.

D.

An incorrect application signature was used in the rule.

Buy Now
Questions 84

A network administrator must create an EtherChannel Interface on a new Cisco Firepower 9300 appliance registered with an FMC tor high availability. Where must the administrator create the EtherChannel interface?

Options:

A.

FMC CLI

B.

FTD CLI

C.

FXOS CLI

D.

FMC GUI

Buy Now
Questions 85

Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?

Options:

A.

configure manager local 10.0.0.10 Cisco123

B.

configure manager add Cisco123 10.0.0.10

C.

configure manager local Cisco123 10.0.0.10

D.

configure manager add 10.0.0.10 Cisco123

Buy Now
Questions 86

A network engineer detects a connectivity issue between Cisco Secure Firewall Management Centre and Cisco Secure Firewall Threat Defense Initial troubleshooting indicates that heartbeats and events not being received. The engineer re-establishes the secure channels between both peers Which two commands must the engineer run to resolve the issue? (Choose two.)

Options:

A.

manage_procs.pl

B.

sudo stats_unified.pl

C.

sudo perfstats -Cq < /var/sf/rna/correlator-stats/now

D.

show history

E.

show disk-manager

Buy Now
Questions 87

IT management is asking the network engineer to provide high-level summary statistics of the Cisco FTD appliance in the network. The business is approaching a peak season so the need to maintain business uptime is high. Which report type should be used to gather this information?

Options:

A.

Malware Report

B.

Standard Report

C.

SNMP Report

D.

Risk Report

Buy Now
Questions 88

300-710 Question 88

Refer to the exhibit. An engineer is deploying a new instance of Cisco Secure Firewall Threat Defense. Which action must the engineer take next so that Client_A and Client_B receive an IP address via DHCP from Server_A?

Options:

A.

Disable Option 82 in the DHCP relay configuration properties using Secure Firewall Management Center.

B.

Add access rules that allow DHCP traffic by using Cisco Secure Firewall Management Center.

C.

Add another DHCP pool on Server_A with DHCP relay on Secure Firewall Threat Defense.

D.

Disable all the DHCP Snort rules by using Secure Firewall Device Manager.

Buy Now
Questions 89

An engineer is tasked with deploying an internal perimeter firewall that will support multiple DMZs Each DMZ has a unique private IP subnet range. How is this requirement satisfied?

Options:

A.

Deploy the firewall in transparent mode with access control policies.

B.

Deploy the firewall in routed mode with access control policies.

C.

Deploy the firewall in routed mode with NAT configured.

D.

Deploy the firewall in transparent mode with NAT configured.

Buy Now
Questions 90

Refer to the exhibit.

300-710 Question 90

An administrator is looking at some of the reporting capabilities for Cisco Firepower and noticed this section of the Network Risk report showing a lot of SSL activity that cloud be used for evasion. Which action will mitigate this risk?

Options:

A.

Use SSL decryption to analyze the packets.

B.

Use encrypted traffic analytics to detect attacks

C.

Use Cisco AMP for Endpoints to block all SSL connection

D.

Use Cisco Tetration to track SSL connections to servers.

Buy Now
Questions 91

An engineer is reviewing an existing custom server fingerprint on a Cisco Secure Firewall because the current information is inaccurate. Which action must the engineer take to improve the accuracy of the network discovery rules?

Options:

A.

Exclude the IP address that is used to communicate with the monitored host.

B.

Exclude the ports that must be skipped.

C.

Add NetFlow monitoring for the network segment.

D.

Set one common rule to override the reports in the multidomain environment.

Buy Now
Questions 92

An engineer wants to add an additional Cisco FTD Version 6.2.3 device to their current 6.2.3 deployment to create a high availability pair.

The currently deployed Cisco FTD device is using local management and identical hardware including the available port density to enable the failover and stateful links required in a proper high availability deployment. Which action ensures that the environment is ready to pair the new Cisco FTD with the old one?

Options:

A.

Change from Cisco FDM management to Cisco FMC management on both devices and register them to FMC.

B.

Ensure that the two devices are assigned IP addresses from the 169 254.0.0/16 range for failoverinterfaces.

C.

Factory reset the current Cisco FTD so that it can synchronize configurations with the new Cisco FTDdevice.

D.

Ensure that the configured DNS servers match on the two devices for name resolution.

Buy Now
Questions 93

An administrator configures the interfaces of a Cisco Secure Firewall Threat Defence device in an inline IPS deployment. The administrator completes these actions:

* identifies the device and the interfaces

* sets the interface mode to inline

* enables the interlaces

Which configuration step must the administrator take next to complete the implementation?

Options:

A.

Enable spanning-tree PortFast on the interfaces.

B.

Configure an inline set

C.

Set the interface to Transparent mode.

D.

Set the interface to routed mode.

Buy Now
Questions 94

When creating a report template, how can the results be limited to show only the activity of a specific subnet?

Options:

A.

Create a custom search in Firepower Management Center and select it in each section of the report.

B.

Add an Input Parameter in the Advanced Settings of the report, and set the type to Network/IP.

C.

Add a Table View section to the report with the Search field defined as the network in CIDR format.

D.

Select IP Address as the X-Axis in each section of the report.

Buy Now
Questions 95

Which feature issupportedby IRB on Cisco FTD devices?

Options:

A.

redundant interface

B.

dynamic routing protocol

C.

EtherChannel interface

D.

high-availability cluster

Buy Now
Questions 96

Which command must be run to generate troubleshooting files on an FTD?

Options:

A.

system support view-files

B.

sudo sf_troubleshoot.pl

C.

system generate-troubleshoot all

D.

show tech-support

Buy Now
Questions 97

A network administrator is configuring an instance of Cisco Secure Firewall Threat Defense, which is registered to Cisco Secure Firewall Management Center, to prevent internal users from downloading executable files from the internet. What must be created and configured by the administrator to meet the requirement?

Options:

A.

Access policy rule that allows users to reach the internet and assigns a file policy that blocks executable downloads to the rule.

B.

File policy that blocks downloads of all executable files and applies the file policy to the default action in the access policy.

C.

File policy rule that allows users to reach the internet with a second rule applied that blocks application use of FTP.

D.

Access policy rule that allows users to reach the internet with a second rule that blocks application executables.

Buy Now
Questions 98

Which report template field format is available in Cisco FMC?

Options:

A.

box lever chart

B.

arrow chart

C.

bar chart

D.

benchmark chart

Buy Now
Questions 99

What is a functionality of port objects in Cisco FMC?

Options:

A.

to mix transport protocols when setting both source and destination port conditions in a rule

B.

to represent protocols other than TCP, UDP, and ICMP

C.

to represent all protocols in the same way

D.

to add any protocol other than TCP or UDP for source port conditions in access control rules.

Buy Now
Questions 100

What is a characteristic of bridge groups on a Cisco FTD?

Options:

A.

In routed firewall mode, routing between bridge groups must pass through a routed interface.

B.

In routed firewall mode, routing between bridge groups is supported.

C.

In transparent firewall mode, routing between bridge groups is supported

D.

Routing between bridge groups is achieved only with a router-on-a-stick configuration on a connected router

Buy Now
Questions 101

A company has many Cisco FTD devices managed by a Cisco FMC. The security model requires that access control rule logs be collected for analysis. The security engineer is concerned that the Cisco FMC will not be able to process the volume of logging that will be generated. Which configuration addresses this concern?

Options:

A.

Send Cisco FTD connection events and security events directly to SIEM system for storage and analysis.

B.

Send Cisco FTD connection events and security events to a cluster of Cisco FMC devices for storage and analysis.

C.

Send Cisco FTD connection events and security events to Cisco FMC and configure it to forward logs to SIEM for storage and analysis.

D.

Send Cisco FTD connection events directly to a SIEM system and forward security events from Cisco FMC to the SIEM system for storage and analysis.

Buy Now
Questions 102

Which protocol establishes network redundancy in a switched Firepower device deployment?

Options:

A.

STP

B.

HSRP

C.

GLBP

D.

VRRP

Buy Now
Questions 103

Which component is needed to perform rapid threat containment with Cisco FMC?

Options:

A.

ISE

B.

RESTful API

C.

SIEM

D.

DDI

Buy Now
Questions 104

An engineer must investigate a connectivity issue and decides to use the packet capture feature on Cisco FTD. The goal is to see the real packet going through the Cisco FTD device and see the Snort detection actions as a part of the output. After the capture-traffic command is issued, only the packets are displayed. Which action resolves this issue?

Options:

A.

Use the verbose option as a part of the capture-traffic command

B.

Use the capture command and specify the trace option to get the required information.

C.

Specify the trace using the -T option after the capture-traffic command.

D.

Perform the trace within the Cisco FMC GUI instead of the Cisco FTD CLI.

Buy Now
Questions 105

An engineer must configure high availability on two Cisco Secure Firewall Threat Defense appliances. Drag and drop the configuration steps from the left into the sequence on the right.

300-710 Question 105

Options:

Buy Now
Questions 106

Which firewall mode is Cisco Secure Firewall Threat Defense in when two physical interfaces are assigned to a named BVI?

Options:

A.

Routed

B.

Transparent

C.

In-line

D.

IPS only

Buy Now
Questions 107

A network administrator wants to configure a Cisco Secure Firewall Threat Defense instance managed by Cisco Secure Firewall Management Center to block traffic to known cryptomning networks. Which system settings must the administrator configure in Secure Firewall Management Center to meet the requirement?

Options:

A.

Access Policy. Security Intelligence

B.

Malware Policy.

C.

Rules Intrusion Policy. Security Intelligence

D.

Access Policy. Rules

Buy Now
Questions 108

What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?

Options:

A.

VPN connections can be re-established only if the failed master unit recovers.

B.

Smart License is required to maintain VPN connections simultaneously across all cluster units.

C.

VPN connections must be re-established when a new master unit is elected.

D.

Only established VPN connections are maintained when a new master unit is elected.

Buy Now
Questions 109

An engineer is working on a LAN switch and has noticed that its network connection to the mime Cisco IPS has gone down Upon troubleshooting it is determined that the switch is working as expected What must have been implemented for this failure to occur?

Options:

A.

The upstream router has a misconfigured routing protocol

B.

Link-state propagation is enabled

C.

The Cisco IPS has been configured to be in fail-open mode

D.

The Cisco IPS is configured in detection mode

Buy Now
Questions 110

An engineer is restoring a Cisco FTD configuration from a remote backup using the command restore remote-manager-backup location 1.1.1.1 admin /volume/home/admin BACKUP_Cisc394602314.zip on a Cisco FMG. After connecting to the repository, an error occurred that prevents the FTD device from accepting the backup file. What is the problem?

Options:

A.

The backup file is not in .cfg format.

B.

The backup file is too large for the Cisco FTD device

C.

The backup file extension was changed from tar to zip

D.

The backup file was not enabled prior to being applied

Buy Now
Questions 111

The event dashboard within the Cisco FMC has been inundated with low priority intrusion drop events, which are overshadowing high priority events. An engineer has been tasked with reviewing the policies and reducing the low priority events. Which action should be configured to accomplish this task?

Options:

A.

generate events

B.

drop packet

C.

drop connection

D.

drop and generate

Buy Now
Questions 112

A security engineer must create a malware and file policy on a Cisco Secure Firewall Threat Defense device. The solution must ensure that PDF. DOCX, and XLSX files are not sent lo Cisco Secure Malware analytics. What must do configured to meet the requirements''

Options:

A.

capacity handling

B.

Spero analysis

C.

dynamic analysis

D.

local malware analysis

Buy Now
Questions 113

A security engineer must integrate an external feed containing STIX/TAXII data with Cisco FMC. Which feature must be enabled on the Cisco FMC to support this connection?

Options:

A.

Cisco Success Network

B.

Cisco Secure Endpoint Integration

C.

Threat Intelligence Director

D.

Security Intelligence Feeds

Buy Now
Questions 114

An engineer must export a packet capture from Cisco Secure Firewall Management Center to assist in troubleshooting an issue an a Secure Firewall Threat Defense device. When the engineer navigates to URL for Secure Firewall Management Center at:

../capture/CAP/pcap/sample.pcap

An engineer receives a 403: Forbidden error instead of being provided with the PCAP file. Which action resolves the issue?

Options:

A.

Disable the HTTPS server and use HTTP.

B.

Enable the proxy setting in the device platform policy.

C.

Enable HTTPS in the device platform policy.

D.

Disable the proxy setting on the client browser.

Buy Now
Questions 115

An engineer is configuring Cisco Secure Firewall Threat Defense managed by a Secure Firewall Management Center appliance. The company wants remote access VPN users to be reachable from the inside network. What must the engineer configure to meet the requirements?

Options:

A.

manual NAT exemption rule at the top of the NAT policy

B.

manual NAT exemption rule at the bottom of the NAT policy

C.

auto NAT exemption rule at the top of the NAT policy

D.

auto NAT exemption rule at the bottom of the NAT policy

Buy Now
Exam Code: 300-710
Exam Name: Securing Networks with Cisco Firepower (300-710 SNCF)
Last Update: Dec 5, 2025
Questions: 385

PDF + Testing Engine

$144.99

Testing Engine

$109.99

PDF (Q&A)

$94.99