Download CCNP Security Implementing Cisco Threat Control Solutions.300-210.RealTests.2019-10-22.270q.vcex

Vendor: Cisco
Exam Code: 300-210
Exam Name: CCNP Security Implementing Cisco Threat Control Solutions
Date: Oct 22, 2019
File Size: 10 MB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which three operating systems are supported with Cisco AMP for Endpoints? (Choose three.)
  1. Windows
  2. AWS
  3. Android
  4. Cisco IOS
  5. OS X
  6. ChromeOS
Correct answer: ACE
Question 2
Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?
  1. explicit forward mode
  2. Layer 4 Traffic Monitor
  3. transparent mode
  4. Secure Web Proxy
Correct answer: B
Question 3
Which feature requires the network discovery policy for it to work on the Cisco Next Generation Intrusion Prevention System?
  1. impact flags
  2. URL filtering
  3. security intelligence
  4. health monitoring
Correct answer: C
Question 4
What are two arguments that can be used with the show content-scan command in Cisco IOS software? (Choose two.)
  1. data
  2. session
  3. buffer
  4. statistics
  5. verbose
Correct answer: BD
Question 5
What is a difference between a Cisco Content Security Management virtual appliance and a physical appliance?
  1. Migration between virtual appliances of varying sizes is possible, but physical appliances must be of equal size.
  2. The virtual appliance requires an additional license to run on a host.
  3. The physical appliance requires an additional license to activate its adapters.
  4. The physical appliance is configured with a DHCP-enabled management port to receive an IP address automatically, but you must assign the virtual appliance an IP address manually in your management subnet.
Correct answer: B
Question 6
Which detection method is also known as machine learning on Network-based Cisco Advanced Malware Protection?
  1. custom file detection
  2. hashing
  3. Spero engine
  4. dynamic analysis
Correct answer: C
Question 7
Which Cisco Firepower rule action displays a HTTP warning page and resets the connection of HTTP traffic specified in the access control rule?
  1. Interactive Block with Reset
  2. Block
  3. Allow with Warning
  4. Interactive Block
Correct answer: A
Question 8
  
Refer to the exhibit. Which option is a result of this configuration?
  1. All ingress traffic on the inside interface that matches the access list is redirected.
  2. All egress traffic on the outside interface that matches the access list if redirected.
  3. All TCP traffic that arrives on the inside interface is redirected.
  4. All ingress traffic that arrives on the inside interface is redirected.
  5. All ingress and egress traffic is redirected to the Cisco FirePOWER module.
Correct answer: E
Question 9
What are two requirements for configuring a hybrid interface in FirePOWER? (Choose two.)
  1. virtual network
  2. virtual router
  3. virtual appliance
  4. virtual switch
  5. virtual context
Correct answer: BD
Question 10
When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.)
  1. rootkit detection
  2. spam scanning
  3. APT detection
  4. antivirus scanning
  5. URL filtering
Correct answer: BD
Question 11
Which three operating systems are supported with Cisco AMP for Endpoints? (Choose three.)
  1. Windows
  2. AWS
  3. Android
  4. Cisco IOS
  5. OS X
  6. ChromeOS
Correct answer: ACE
Question 12
Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?
  1. explicit forward mode
  2. Layer 4 Traffic Monitor
  3. transparent mode
  4. Secure Web Proxy
Correct answer: B
Question 13
Which feature requires the network discovery policy for it to work on the Cisco Next Generation Intrusion Prevention System?
  1. impact flags
  2. URL filtering
  3. security intelligence
  4. health monitoring
Correct answer: C
Question 14
What are two arguments that can be used with the show content-scan command in Cisco IOS software? (Choose two.)
  1. data
  2. session
  3. buffer
  4. statistics
  5. verbose
Correct answer: BD
Question 15
What is a difference between a Cisco Content Security Management virtual appliance and a physical appliance?
  1. Migration between virtual appliances of varying sizes is possible, but physical appliances must be of equal size.
  2. The virtual appliance requires an additional license to run on a host.
  3. The physical appliance requires an additional license to activate its adapters.
  4. The physical appliance is configured with a DHCP-enabled management port to receive an IP address automatically, but you must assign the virtual appliance an IP address manually in your management subnet.
Correct answer: B
Question 16
Which detection method is also known as machine learning on Network-based Cisco Advanced Malware Protection?
  1. custom file detection
  2. hashing
  3. Spero engine
  4. dynamic analysis
Correct answer: C
Question 17
Which Cisco Firepower rule action displays a HTTP warning page and resets the connection of HTTP traffic specified in the access control rule?
  1. Interactive Block with Reset
  2. Block
  3. Allow with Warning
  4. Interactive Block
Correct answer: A
Question 18
  
Refer to the exhibit. Which option is a result of this configuration?
  1. All ingress traffic on the inside interface that matches the access list is redirected.
  2. All egress traffic on the outside interface that matches the access list if redirected.
  3. All TCP traffic that arrives on the inside interface is redirected.
  4. All ingress traffic that arrives on the inside interface is redirected.
  5. All ingress and egress traffic is redirected to the Cisco FirePOWER module.
Correct answer: E
Question 19
What are two requirements for configuring a hybrid interface in FirePOWER? (Choose two.)
  1. virtual network
  2. virtual router
  3. virtual appliance
  4. virtual switch
  5. virtual context
Correct answer: BD
Question 20
When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.)
  1. rootkit detection
  2. spam scanning
  3. APT detection
  4. antivirus scanning
  5. URL filtering
Correct answer: BD
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!