New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Cisco 300-710 Practice Exam with Questions & Answers | Set: 4

Questions 31

A network engineer is deploying a Cisco Firepower 4100 appliance and must configure a multi-instance environment for high availability. Drag and drop me actions from the left into sequence on the right far this configuration.

300-710 Question 31

Options:
Cisco 300-710 Premium Access
Questions 32

After using Firepower for some time and learning about how it interacts with the network, an administrator is trying to correlate malicious activity with a user Which widget should be configured to provide this visibility on the Cisco Firepower dashboards?

Options:
A.

Custom Analysis

B.

Current Status

C.

Current Sessions

D.

Correlation Events

Questions 33

An engineer must configure a new identity policy in Cisco Firepower Management Center. Active authentication must be configured by using a Kerberos connection. Which two realms must be configured? (Choose two.)

Options:
A.

Directory password

B.

Active directory join password

C.

Active directory primary domain

D.

Active directory join username

E.

Directory username

Questions 34

300-710 Question 34

Refer to the exhibit. A security engineer views the health alerts in Cisco Secure Firewall Management Center by using the Health Monitor in the web interface. One of the alerts shows an appliance as critical because the Time Synchronization module status is out of sync. To troubleshoot the issue, the engineer runs the ntpq command in Secure Firewall Management Center. The output is shown in the exhibit. Which action must the security engineer take next to resolve the issue?

Options:
A.

Reset the appliance with a hard reboot.

B.

Reestablish the connection to the timeserver.

C.

Configure the appliance to receive the time from an NTP server.

D.

Configure the appliance to sync with its own internal clock.

Questions 35

A network administrator notices that inspection has been interrupted on all non-managed interfaces of a device. What is the cause of this?

Options:
A.

The value of the highest MTU assigned to any non-management interface was changed.

B.

The value of the highest MSS assigned to any non-management interface was changed.

C.

A passive interface was associated with a security zone.

D.

Multiple inline interface pairs were added to the same inline interface.

Questions 36

300-710 Question 36

Refer to the exhibit An engineer is modifying an access control pokey to add a rule to inspect all DNS traffic that passes through the firewall After making the change and deploying thepokey they see that DNS traffic is not bang inspected by the Snort engine What is the problem?

Options:
A.

The rule must specify the security zone that originates the traffic

B.

The rule must define the source network for inspection as well as the port

C.

The action of the rule is set to trust instead of allow.

D.

The rule is configured with the wrong setting for the source port

Questions 37

On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?

Options:
A.

transparent inline mode

B.

TAP mode

C.

strict TCP enforcement

D.

propagate link state

Questions 38

An engineer is configuring a custom intrusion rule on Cisco FMC. The engineer needs the rule to search the payload or stream for the string "|45 5* 26 27 4 0A|*. Which Keyword must the engineer use with this stung lo create an argument for packed inspection?

Options:
A.

metadata

B.

Content

C.

Protected _ content

D.

data

Questions 39

An engineer is configuring a custom application detector for HTTP traffic and wants to import a file that was provided by a third party. Which type of flies are advanced application detectors creates and uploaded as?

Options:
A.

Perl script

B.

NBAR protocol

C.

LUA script

D.

Python program

Questions 40

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

Options:
A.

Traffic inspection can be interrupted temporarily when configuration changes are deployed.

B.

The system performs intrusion inspection followed by file inspection.

C.

They can block traffic based on Security Intelligence data.

D.

File policies use an associated variable set to perform intrusion prevention.

E.

The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.

Cisco Related Exams

How to pass Cisco 300-715 - Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Exam
How to pass Cisco 300-720 - Securing Email with Cisco Email Security Appliance (300-720 SESA) Exam
How to pass Cisco 300-725 - Securing the Web with Cisco Web Security Appliance (300-725 SWSA) Exam
How to pass Cisco 300-730 - Implementing Secure Solutions with Virtual Private Networks (SVPN) Exam
How to pass Cisco 300-735 - Automating and Programming Cisco Security Solutions (300-735 SAUTO) Exam
How to pass Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) Exam
How to pass Cisco 300-740 - Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Exam

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.