최신 300-710 무료덤프 - Cisco Securing Networks with Cisco Firepower
The event dashboard within the Cisco FMC has been inundated with low priority intrusion drop events, which are overshadowing high priority events. An engineer has been tasked with reviewing the policies and reducing the low priority events.
Which action should be configured to accomplish this task?
Which action should be configured to accomplish this task?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)
정답: B,D
설명: (DumpTOP 회원만 볼 수 있음)
An administrator receives reports that users cannot access a cloud-hosted web server. The access control policy was recently updated with several new policy additions and URL filtering.
What must be done to troubleshoot the issue and restore access without sacrificing the organization's security posture?
What must be done to troubleshoot the issue and restore access without sacrificing the organization's security posture?
정답: C
Refer to the exhibit. A security engineer must improve security in an organization and is producing a risk mitigation strategy to present to management for approval. Which action must the security engineer take based on this Attacks Risk Report?


정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An administrator is creating interface objects to better segment their network but is having trouble adding interfaces to the objects. What is the reason for this failure?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which protocol is needed to exchange threat details in rapid threat containment on Cisco FMC?
정답: B
Which Cisco Firepower rule action displays an HTTP warning page?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
A security engineer is reviewing a Cisco Secure Endpoint public cloud instance. The engineer discovers a malicious verdict for a SHA-256 hash of
689efc1ecdc23ec0b0885a80663e30ea013d493f8e88224b570a1234567890.
Which configuration action must be done in Secure Endpoint console to mitigate the threat?
689efc1ecdc23ec0b0885a80663e30ea013d493f8e88224b570a1234567890.
Which configuration action must be done in Secure Endpoint console to mitigate the threat?
정답: B
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?
정답: D
With a recent summer time change, system logs are showing activity that occurred to be an hour behind real time. Which action should be taken to resolve this issue?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
An engineer must export a packet capture from Cisco Secure Firewall Management Center to assist in troubleshooting an issue on a Secure Firewall Threat Defense device. When the engineer navigates to the URL for Secure Firewall Management Center at:
https:///capture/CAPI/pcap/sample.pcap
The engineer receives a 403: Forbidden error instead of being provided with the PCAP file. Which action resolves the issue?
https:///capture/CAPI/pcap/sample.pcap
The engineer receives a 403: Forbidden error instead of being provided with the PCAP file. Which action resolves the issue?
정답: D
An administrator is attempting to remotely log into a switch in the data centre using SSH and is unable to connect.
How does the administrator confirm that traffic is reaching the firewall?
How does the administrator confirm that traffic is reaching the firewall?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
After deploying a network-monitoring tool to manage and monitor networking devices in your organization, you realize that you need to manually upload an MIB for the Cisco FMC. In which folder should you upload the MIB file?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)
Refer to the exhibit. An engineer is troubleshooting connectivity issues over a VPN tunnel. Users from the 192.168.68.0/24 network report that they cannot connect to a remote web server that has an IP address of 192.168.67.100. The engineer confirms that NAT and access control rules on the local Cisco Secure Firewall Threat Defense Virtual will allow the connection. Which two configuration changes must the engineer make to resolve the connectivity issues? (Choose two.)


정답: D,E
The security engineer reviews the syslog server events of an organization and sees many outbound connections to malicious sites initiated from hosts running Cisco Secure Endpoint. The hosts are on a separate network from the Cisco FTD device. Which action blocks the connections?
정답: C
A network administrator is configuring Snort inspection policies and is seeing failed deployment messages in Cisco FMC.
What information should the administrator generate for Cisco TAC to help troubleshoot?
What information should the administrator generate for Cisco TAC to help troubleshoot?
정답: C
설명: (DumpTOP 회원만 볼 수 있음)
An administrator is configuring the interface of a Cisco Secure Firewall Threat Defense firewall device in a passive IPS deployment. The device and interface have been identified. Which set of configuration steps must the administrator perform next to complete the implementation?
정답: D
설명: (DumpTOP 회원만 볼 수 있음)