New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 300-710 Practice Exam with Questions & Answers | Set: 2

Questions 11

What is an attribute of the risk reporting capability in Cisco Secure Firewall Management Center?

Options:
A.

Includes all domains in a multidomain system

B.

Uses the same templates available to standard reports

C.

Includes the current domain in a multidomain system

D.

Uses the XML format to export all reporting

Cisco 300-710 Premium Access
Questions 12

A network administrator is trying to convert from LDAP to LDAPS for VPN user authentication on a Cisco FTD. Which action must be taken on the Cisco FTD objects to accomplish this task?

Options:
A.

Add a Key Chain object to acquire the LDAPS certificate.

B.

Create a Certificate Enrollment object to get the LDAPS certificate needed.

C.

Identify the LDAPS cipher suite and use a Cipher Suite List object to define the Cisco FTD connection requirements.

D.

Modify the Policy List object to define the session requirements for LDAPS.

Questions 13

What is the difference between inline and inline tap on Cisco Firepower?

Options:
A.

Inline tap mode can send a copy of the traffic to another device.

B.

Inline tap mode does full packet capture.

C.

Inline mode cannot do SSL decryption.

D.

Inline mode can drop malicious traffic.

Questions 14

Which file format can standard reports from Cisco Secure Firewall Management Center be downloaded in?

Options:
A.

ppt

B.

csv

C.

xis

D.

doc

Questions 15

A network administrator registered a new FTD to an existing FMC. The administrator cannot place the FTD in transparent mode. Which action enables transparent mode?

Options:
A.

Add a Bridge Group Interface to the FTD before transparent mode is configured.

B.

Dereglster the FTD device from FMC and configure transparent mode via the CLI.

C.

Obtain an FTD model that supports transparent mode.

D.

Assign an IP address to two physical interfaces.

Questions 16

A network administrator is configuring an instance of Cisco Secure Firewall Threat Defense, which is registered to Cisco Secure Firewall Management Center, to prevent internal users from downloading executable files from the internet. What must be created and configured by the administrator to meet the requirement?

Options:
A.

Access policy rule that allows users to reach the internet and assigns a file policy that blocks executable downloads to the rule.

B.

File policy that blocks downloads of all executable files and applies the file policy to the default action in the access policy.

C.

File policy rule that allows users to reach the internet with a second rule applied that blocks application use of FTP.

D.

Access policy rule that allows users to reach the internet with a second rule that blocks application executables.

Questions 17

Which two actions can be used in an access control policy rule? (Choose two.)

Options:
A.

Block with Reset

B.

Monitor

C.

Analyze

D.

Discover

E.

Block ALL

Questions 18

Which Cisco FMC report gives the analyst information about the ports and protocols that are related to the configured sensitive network for analysis?

Options:
A.

Malware Report

B.

Host Report

C.

Firepower Report

D.

Network Report

Questions 19

What is the advantage of having Cisco Firepower devices send events to Cisco Threat Response via the security services exchange portal directly as opposed to using syslog?

Options:
A.

All types of Cisco Firepower devices are supported.

B.

An on-premises proxy server does not need to be set up and maintained.

C.

Cisco Firepower devices do not need to be connected to the Internet.

D.

Supports all devices that are running supported versions of Cisco Firepower.

Questions 20

An engineer must investigate a connectivity issue and decides to use the packet capture feature on Cisco FTD. The goal is to see the real packet going through the Cisco FTD device and see the Snort detection actions as a part of the output. After the capture-traffic command is issued, only the packets are displayed. Which action resolves this issue?

Options:
A.

Use the verbose option as a part of the capture-traffic command

B.

Use the capture command and specify the trace option to get the required information.

C.

Specify the trace using the -T option after the capture-traffic command.

D.

Perform the trace within the Cisco FMC GUI instead of the Cisco FTD CLI.

Cisco Related Exams

How to pass Cisco 300-715 - Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Exam
How to pass Cisco 300-720 - Securing Email with Cisco Email Security Appliance (300-720 SESA) Exam
How to pass Cisco 300-725 - Securing the Web with Cisco Web Security Appliance (300-725 SWSA) Exam
How to pass Cisco 300-730 - Implementing Secure Solutions with Virtual Private Networks (SVPN) Exam
How to pass Cisco 300-735 - Automating and Programming Cisco Security Solutions (300-735 SAUTO) Exam
How to pass Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) Exam
How to pass Cisco 300-740 - Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Exam

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.