300-710 Exam Questions - Online Test


300-710 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Your success in Cisco 300-710 is our sole target and we develop all our 300-710 braindumps in a way that facilitates the attainment of this target. Not only is our 300-710 study material the best you can find, it is also the most detailed and the most updated. 300-710 Practice Exams for Cisco Cisco Other Exam 300-710 are written to the highest standards of technical accuracy.

Online Cisco 300-710 free dumps demo Below:

NEW QUESTION 1
What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?

  • A. VPN connections can be re-established only if the failed master unit recovers.
  • B. Smart License is required to maintain VPN connections simultaneously across all cluster units.
  • C. VPN connections must be re-established when a new master unit is elected.
  • D. Only established VPN connections are maintained when a new master unit is elected.

Answer: C

NEW QUESTION 2
Which Cisco Firepower rule action displays an HTTP warning page?

  • A. Monitor
  • B. Block
  • C. Interactive Block
  • D. Allow with Warning

Answer: C

NEW QUESTION 3
Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?

  • A. configure high-availability resume
  • B. configure high-availability disable
  • C. system support network-options
  • D. configure high-availability suspend

Answer: B

NEW QUESTION 4
Which two actions can be used in an access control policy rule? (Choose two.)

  • A. Block with Reset
  • B. Monitor
  • C. Analyze
  • D. Discover
  • E. Block ALL

Answer: AB

NEW QUESTION 5
Which command-line mode is supported from the Cisco Firepower Management Center CLI?

  • A. privileged
  • B. user
  • C. configuration
  • D. admin

Answer: C

NEW QUESTION 6
Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)

  • A. Redundant Interface
  • B. EtherChannel
  • C. Speed
  • D. Media Type
  • E. Duplex

Answer: CE

NEW QUESTION 7
In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

  • A. Traffic inspection can be interrupted temporarily when configuration changes are deployed.
  • B. The system performs intrusion inspection followed by file inspection.
  • C. They can block traffic based on Security Intelligence data.
  • D. File policies use an associated variable set to perform intrusion prevention.
  • E. The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.

Answer: AC

NEW QUESTION 8
After deploying a network-monitoring tool to manage and monitor networking devices in your organization, you realize that you need to manually upload an MIB for the Cisco FMC. In which folder should you upload the MIB file?

  • A. /etc/sf/DCMIB.ALERT
  • B. /sf/etc/DCEALERT.MIB
  • C. /etc/sf/DCEALERT.MIB
  • D. system/etc/DCEALERT.MIB

Answer: C

NEW QUESTION 9
How many report templates does the Cisco Firepower Management Center support?

  • A. 20
  • B. 10
  • C. 5
  • D. unlimited

Answer: D

NEW QUESTION 10
Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)

  • A. An option to re-apply NAT and VPN policies during registration is available, so users do not need to re-apply the policies after registration is completed.
  • B. Before re-adding the device in Cisco FMC, you must add the manager back in the device.
  • C. No option to delete and re-add a device is available in the Cisco FMC web interface.
  • D. The Cisco FMC web interface prompts users to re-apply access control policies.
  • E. No option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the policies after registration is completed.

Answer: DE

NEW QUESTION 11
Which two deployment types support high availability? (Choose two.)

  • A. transparent
  • B. routed
  • C. clustered
  • D. intra-chassis multi-instance
  • E. virtual appliance in public cloud

Answer: AB

NEW QUESTION 12
When creating a report template, how can the results be limited to show only the activity of a specific subnet?

  • A. Create a custom search in Firepower Management Center and select it in each section of the report.
  • B. Add an Input Parameter in the Advanced Settings of the report, and set the type to Network/IP.
  • C. Add a Table View section to the report with the Search field defined as the network in CIDR format.
  • D. Select IP Address as the X-Axis in each section of the report.

Answer: B

NEW QUESTION 13
Which object type supports object overrides?

  • A. time range
  • B. security group tag
  • C. network object
  • D. DNS server group

Answer: C

NEW QUESTION 14
What is a result of enabling Cisco FTD clustering?

  • A. For the dynamic routing feature, if the master unit fails, the newly elected master unit maintains all existing connections.
  • B. Integrated Routing and Bridging is supported on the master unit.
  • C. Site-to-site VPN functionality is limited to the master unit, and all VPN connections are dropped if the master unit fails.
  • D. All Firepower appliances can support Cisco FTD clustering.

Answer: C

NEW QUESTION 15
Which interface type allows packets to be dropped?

  • A. passive
  • B. inline
  • C. ERSPAN
  • D. TAP

Answer: B

NEW QUESTION 16
Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)

  • A. BGPv6
  • B. ECMP with up to three equal cost paths across multiple interfaces
  • C. ECMP with up to three equal cost paths across a single interface
  • D. BGPv4 in transparent firewall mode
  • E. BGPv4 with nonstop forwarding

Answer: AC

NEW QUESTION 17
Which command must be run to generate troubleshooting files on an FTD?

  • A. system support view-files
  • B. sudo sf_troubleshoot.pl
  • C. system generate-troubleshoot all
  • D. show tech-support

Answer: B

NEW QUESTION 18
Which action should be taken after editing an object that is used inside an access control policy?

  • A. Delete the existing object in use.
  • B. Refresh the Cisco FMC GUI for the access control policy.
  • C. Redeploy the updated configuration.
  • D. Create another rule using a different object name.

Answer: C

NEW QUESTION 19
Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)

  • A. dynamic key mapping objects that help link HTTP and HTTPS GET requests to Layer 7 application protocols.
  • B. reputation-based objects that represent Security Intelligence feeds and lists, application filters based on category and reputation, and file lists
  • C. network-based objects that represent IP address and networks, port/protocols pairs, VLAN tags, security zones, and origin/destination country
  • D. network-based objects that represent FQDN mappings and networks, port/protocol pairs, VXLAN tags, security zones and origin/destination country
  • E. reputation-based objects, such as URL categories

Answer: BC

NEW QUESTION 20
Within Cisco Firepower Management Center, where does a user add or modify widgets?

  • A. dashboard
  • B. reporting
  • C. context explorer
  • D. summary tool

Answer: A

NEW QUESTION 21
DRAG DROP
Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC from the left into the correct order on the right. Not all options are used.
Select and Place:

  • A. Mastered
  • B. Not Mastered

Answer: A

NEW QUESTION 22
A network engineer is configuring URL Filtering on Firepower Threat Defense. Which two port requirements on the Firepower Management Center must be validated to allow communication with the cloud service? (Choose two.)

  • A. outbound port TCP/443
  • B. inbound port TCP/80
  • C. outbound port TCP/8080
  • D. inbound port TCP/443
  • E. outbound port TCP/80

Answer: AE

NEW QUESTION 23
Which group within Cisco does the Threat Response team use for threat analysis and research?

  • A. Cisco Deep Analytics
  • B. OpenDNS Group
  • C. Cisco Network Response
  • D. Cisco Talos

Answer: D

NEW QUESTION 24
Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)

  • A. EIGRP
  • B. OSPF
  • C. static routing
  • D. IS-IS
  • E. BGP

Answer: CE

NEW QUESTION 25
What is a valid Cisco AMP file disposition?

  • A. non-malicious
  • B. malware
  • C. known-good
  • D. pristine

Answer: B

NEW QUESTION 26
......

100% Valid and Newest Version 300-710 Questions & Answers shared by Downloadfreepdf.net, Get Full Dumps HERE: https://www.downloadfreepdf.net/300-710-pdf-download.html (New 0 Q&As)