Pass 300-710 SNCF in Just 3 Days – Stress-Free!
Get your 300-710 Securing Networks with Cisco Firepower certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
Question 201
An engineer must configure a Cisco FMC dashboard in a multidomain deployment. Which action must the engineer take to edit a report template from an ancestor domain?
- A. Copy it to the current domain.
- B. Add it as a separate widget.
- C. Change the document attributes.
- D. Assign themselves ownership of it.
Correct Answer: A
Question 202
A company is deploying intrusion protection on multiple Cisco FTD appliances managed by Cisco FMC. Which system-provided policy must be selected if speed and detection are priorities?
- A. Maximum Detection
- B. Connectivity Over Security
- C. Security Over Connectivity
- D. Balanced Security and Connectivity
Correct Answer: D
Question 203
An engineer integrates Cisco FMC and Cisco ISE using pxGrid. Which role is assigned for Cisco FMC?
- A. Server
- B. Controller
- C. Publisher
- D. Client
Correct Answer: D
Question 204
A company wants a solution to aggregate the capacity of two Cisco FTD devices to make the best use of resources such as bandwidth and connections per second. Which order of steps must be taken across the Cisco FTDs with Cisco FMC to meet this requirement?
- A. Add members to the Cisco FMC, configure Cisco FTD interfaces, create the cluster in Cisco FMC, and configure cluster members in Cisco FMC.
- B. Add members to Cisco FMC, configure Cisco FTD interfaces in Cisco FMC, configure cluster members in Cisco FMC, create cluster in Cisco FMC, and configure cluster members in Cisco FMC.
- C. Configure the Cisco FTD interfaces, add members to FMC, configure cluster members in FMC, and create cluster in Cisco FMC.
- D. Configure the Cisco FTD interfaces and cluster members, add members to Cisco FMC, and create the cluster in Cisco FMC.
Correct Answer: D
Question 205
The administrator notices that there is malware present with an .exe extension and needs to verify if any of the systems on the network are running the executable file. What must be configured within Cisco AMP for Endpoints to show this data?
- A. Vulnerable software
- B. File analysis
- C. Threat root cause
- D. Prevalence
Correct Answer: D
Question 206
Upon detecting a flagrant threat on an endpoint, which two technologies instruct Cisco Identity Services Engine to contain the infected endpoint either manually or automatically? (Choose two.)
- A. Cisco Stealthwatch
- B. Cisco ASA 5500 Series
- C. Cisco FMC
- D. Cisco ASR 7200 Series
- E. Cisco AMP
Correct Answer: C, E
Question 207
A security engineer found a suspicious file from an employee email address and is trying to upload it for analysis, however the upload is failing. The last registration status is still active. What is the cause for this issue?
- A. Cisco AMP for Networks is unable to contact Cisco Threat Grid on premise.
- B. There is a host limit set.
- C. The user agent status is set to monitor.
- D. Cisco AMP for Networks is unable to contact Cisco Threat Grid Cloud.
Correct Answer: B
Question 208
What is the role of the casebook feature in Cisco Threat Response?
- A. Pulling data via the browser extension
- B. Alert prioritization
- C. Sharing threat analysis
- D. Triage automation with alerting
Correct Answer: C
Question 209
An engineer is troubleshooting a file that is being blocked by a Cisco FTD device on the network. The user is reporting that the file is not malicious. Which action does the engineer take to identify the file and validate whether or not it is malicious?
- A. Identify the file in the intrusion events and submit it to Threat Grid for analysis.
- B. Use FMC file analysis to look for the file and select Analyze to determine its disposition.
- C. Use the context explorer to find the file and download it to the local machine for investigation.
- D. Right click the connection event and send the file to AMP for Endpoints to see if the hash is malicious.
Correct Answer: A
Question 210
Which protocol is needed to exchange threat details in rapid threat containment on Cisco FMC?
- A. SGT
- B. SNMP v3
- C. BFD
- D. pxGrid
Correct Answer: D