Download Certifications: CCNP Security, Cisco Certified Specialist - Network Security Firepower.300-710.Braindump2go.2024-01-26.189q.vcex

Vendor: Cisco
Exam Code: 300-710
Exam Name: Certifications: CCNP Security, Cisco Certified Specialist - Network Security Firepower
Date: Jan 26, 2024
File Size: 2 MB
Downloads: 2

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
With Cisco FTD software, which interface mode must be configured to passively receive traffic that passes through the appliance?
  1. ERSPAN
  2. IPS-only
  3. firewall
  4. tap
Correct answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/interface_overview_for_firepower_threat_defense.html
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/interface_overview_for_firepower_threat_defense.html
Question 2
A Cisco FTD device is running in transparent firewall mode with a VTEP bridge group member ingress interface.  
What must be considered by an engineer tasked with specifying a destination MAC address for a packet trace?
  1. The destination MAC address is optional if a VLAN ID value is entered
  2. Only the UDP packet type is supported
  3. The output format option for the packet logs unavailable
  4. The VLAN ID and destination MAC address are optional
Correct answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/troubleshooting_the_system.html
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/troubleshooting_the_system.html
Question 3
What is a characteristic of bridge groups on a Cisco FTD?
  1. In routed firewall mode, routing between bridge groups must pass through a routed interface.
  2. In routed firewall mode, routing between bridge groups is supported.
  3. In transparent firewall mode, routing between bridge groups is supported
  4. Routing between bridge groups is achieved only with a router-on-a-stick configuration on a connected router
Correct answer: B
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/asa/asa97/configuration/general/asa-97-general-config/intro-fw.pdf
https://www.cisco.com/c/en/us/td/docs/security/asa/asa97/configuration/general/asa-97-general-config/intro-fw.pdf
Question 4
Network traffic coining from an organization's CEO must never be denied.  
Which access control policy configuration option should be used if the deployment engineer is not permitted to create a rule to allow all traffic?
  1. Configure firewall bypass.
  2. Change the intrusion policy from security to balance.
  3. Configure a trust policy for the CEO.
  4. Create a NAT policy just for the CEO.
Correct answer: C
Question 5
In a multi-tenant deployment where multiple domains are in use. Which update should be applied outside of the Global Domain?
  1. minor upgrade
  2. local import of intrusion rules
  3. Cisco Geolocation Database
  4. local import of major upgrade
Correct answer: C
Question 6
A mid-sized company is experiencing higher network bandwidth utilization due to a recent acquisition. The network operations team is asked to scale up their one Cisco FTD appliance deployment to higher capacities due to the increased network bandwidth.  
Which design option should be used to accomplish this goal?
  1. Deploy multiple Cisco FTD appliances in firewall clustering mode to increase performance.
  2. Deploy multiple Cisco FTD appliances using VPN load-balancing to scale performance.
  3. Deploy multiple Cisco FTD HA pairs to increase performance
  4. Deploy multiple Cisco FTD HA pairs in clustering mode to increase performance
Correct answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/clustering/ftd-cluster-solution.html#concept_C8502505F840451C9E600F1EED9BC18E
https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/clustering/ftd-cluster-solution.html#concept_C8502505F840451C9E600F1EED9BC18E
Question 7
An engineer configures an access control rule that deploys file policy configurations to security zone or tunnel zones, and it causes the device to restart. What is the reason for the restart?
  1. Source or destination security zones in the access control rule matches the security zones that are associated with interfaces on the target devices.
  2. The source tunnel zone in the rule does not match a tunnel zone that is assigned to a tunnel rule in the destination policy.
  3. Source or destination security zones in the source tunnel zone do not match the security zones that are associated with interfaces on the target devices.
  4. The source tunnel zone in the rule does not match a tunnel zone that is assigned to a tunnel rule in the source policy.
Correct answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/policy_management.html
https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/policy_management.html
Question 8
An engineer is attempting to create a new dashboard within the Cisco FMC to have a single view with widgets from many of the other dashboards. The goal is to have a mixture of threat and security related widgets along with Cisco Firepower device health information.  
Which two widgets must be configured to provide this information? (Choose two.)
  1. Intrusion Events
  2. Correlation Information
  3. Appliance Status
  4. Current Sessions
  5. Network Compliance
Correct answer: AC
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/dashboards.html#ID-2206-00000283
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/dashboards.html#ID-2206-00000283
Question 9
An organization is setting up two new Cisco FTD devices to replace their current firewalls and cannot have any network downtime. During the setup process, the synchronization between the two devices is failing.  
What action is needed to resolve this issue?
  1. Confirm that both devices have the same port-channel numbering
  2. Confirm that both devices are running the same software version
  3. Confirm that both devices are configured with the same types of interfaces
  4. Confirm that both devices have the same flash memory sizes
Correct answer: B
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/firepower_threat_defense_high_availability.html#Cisco_Reference.dita_cc8821d8-a5a5-49c0-97fddc9b6f7dbad2
https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/firepower_threat_defense_high_availability.html#Cisco_Reference.dita_cc8821d8-a5a5-49c0-97fddc9b6f7dbad2
Question 10
An engineer is troubleshooting a device that cannot connect to a web server. The connection is initiated from the Cisco FTD inside interface and attempting to reach 10.0.1.100 over the non-standard port of 9443. The host the engineer is attempting the connection from is at the IP address of 10.20.10.20. In order to determine what is happening to the packets on the network, the engineer decides to use the FTD packet capture tool.  
Which capture configuration should be used to gather the information needed to troubleshoot this issue?
  1.    
  2.    
  3.    
  4.    
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!