Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

300-710 Exam Dumps - Securing Networks with Cisco Firepower (300-710 SNCF)

Go to page:
Question # 65

A company is deploying Cisco Secure Endpoint private cloud. The Secure Endpoint private cloud instance has already been deployed by the server administrator. The server administrator provided the hostname of the private cloud instance to the network engineer via email. What additional information does the network engineer require from the server administrator to be able to make the connection to Secure Endpoint private cloud in Cisco Secure Firewall Management Centre?

A.

SSL certificate for the Secure Endpoint ornate cloud instance

B.

Internet access for the Secure End point private cloud to reach the Secure Endpoint public cloud

C.

Username and password to the Secure Endpoint private cloud instance

D.

IP address and port number for the connection proxy

Full Access
Question # 66

An engineer is working on a LAN switch and has noticed that its network connection to the mime Cisco IPS has gone down Upon troubleshooting it is determined that the switch is working as expected What must have been implemented for this failure to occur?

A.

The upstream router has a misconfigured routing protocol

B.

Link-state propagation is enabled

C.

The Cisco IPS has been configured to be in fail-open mode

D.

The Cisco IPS is configured in detection mode

Full Access
Question # 67

After a network security breach, an engineer must strengthen the security of the corporate network. Upper management must be regularly updated with a high-level overview of any

occurring network threats. Which access must the engineer provide upper management to view the required data from Cisco Secure Firewall Management Center?

A.

Analysis > Status with a sliding time window of one day

B.

Events by priority and classification and set a sliding time window of one day

C.

Reports with a daily recurring task that generates based on the network risk report template

D.

Security Intelligence Statistics dashboard set to Show the Last option to one day

Full Access
Question # 68

An administrator is working on a migration from Cisco ASA to the Cisco FTD appliance and needs to test the rules without disrupting the traffic. Which policy type should be used to configure the ASA rules during this phase of the migration?

A.

identity

B.

Intrusion

C.

Access Control

D.

Prefilter

Full Access
Question # 69

Refer to the exhibit.

What must be done to fix access to this website while preventing the same communication to all other websites?

A.

Create an intrusion policy rule to have Snort allow port 80 to only 172.1.1 50.

B.

Create an access control policy rule to allow port 80 to only 172.1.1 50.

C.

Create an intrusion policy rule to have Snort allow port 443 to only 172.1.1.50

D.

Create an access control policy rule to allow port 443 to only 172.1.1 50

Full Access
Question # 70

Which default action setting in a Cisco FTD Access Control Policy allows all traffic from an undefined application to pass without Snort Inspection?

A.

Trust All Traffic

B.

Inherit from Base Policy

C.

Network Discovery Only

D.

Intrusion Prevention

Full Access
Question # 71

An engineer is attempting to add a new FTD device to their FMC behind a NAT device with a NAT ID of ACME001 and a password of Cisco388267669. Which command set must be used in order to accomplish this?

A.

configure manager add ACME001

B.

configure manager add ACME0O1

C.

configure manager add DONTRESOLVE AMCE001

D.

configure manager add registration key> ACME001

Full Access
Question # 72

A network engineer must configure an existing firewall to have a NAT configuration. The now configuration must support more than two interlaces per context. The firewall has previously boon operating transparent mode. The Cisco Secure Firewall Throat Defense (FTD) device has been deregistered from Cisco Secure Firewall Management Center (FMC). Which set of configuration actions must the network engineer take next to meet the requirements?

A.

Run the configure manager add routed command from the Secure FTD device CL1, and reregister with Secure FMC.

B.

Run the configure firewall routed command from the Secure FTD device CD, and reregister with Secure FMC.

C.

Run the configure manager add routed command from the Secure FMC CLI. and reregister with Secure FMC.

D.

Run the configure firewall routed command from the Secure FMC CLI. and reregister with Secure FMC.

Full Access
Go to page: