Pass 300-710 SNCF in Just 3 Days – Stress-Free!
Get your 300-710 Securing Networks with Cisco Firepower certification with 100% pass guarantee. Pay only after passing!
Click here to secure your guaranteed certification now!
Have questions? Contact us directly on WhatsApp for quick support!
Question 211
The network administrator wants to enhance the network security posture by enabling machine learning for malware detection due to a concern with suspicious Microsoft executable file types that were seen while creating monthly security reports for the CIO. Which feature must be enabled to accomplish this goal?
- A. Ethos
- B. Static analysis
- C. Spero
- D. Dynamic analysis
Correct Answer: C
Question 212
What is the RTC workflow when the infected endpoint is identified?
- A. Cisco ISE instructs Cisco AMP to contain the infected endpoint.
- B. Cisco ISE instructs Cisco FMC to contain the infected endpoint.
- C. Cisco FMC instructs Cisco ISE to contain the infected endpoint.
- D. Cisco AMP instructs Cisco FMC to contain the infected endpoint.
Correct Answer: C
Question 213
A network administrator is configuring a Cisco AMP public cloud instance and wants to capture infections and polymorphic variants of a threat to help detect families of malware. Which detection engine meets this requirement?
- A. Ethos
- B. Tetra
- C. RBAC
- D. Spero
Correct Answer: A
Question 214
Due to an increase in malicious events, a security engineer must generate a threat report to include intrusion events, malware events, and security intelligence events. How is this information collected in a single report?
- A. Run the default Firepower report.
- B. Create a Custom report.
- C. Generate a malware report.
- D. Export the Attacks Risk report.
Correct Answer: B
Question 215
A network administrator is trying to convert from LDAP to LDAPS for VPN user authentication on a Cisco FTD. Which action must be taken on the Cisco FTD objects to accomplish this task?
- A. Identify the LDAPS cipher suite and use a Cipher Suite List object to define the Cisco FTD connection requirements.
- B. Modify the Policy List object to define the session requirements for LDAPS.
- C. Add a Key Chain object to acquire the LDAPS certificate.
- D. Create a Certificate Enrollment object to get the LDAPS certificate needed.
Correct Answer: D
Question 216
A network administrator is configuring an FTD in transparent mode. A bridge group is set up and an access policy has been set up to allow all IP traffic. Traffic is not passing through the FTD. What additional configuration is needed?
- A. An IP address must be assigned to the BVI.
- B. The security levels of the interfaces must be set.
- C. A default route must be added to the FTD.
- D. A mac-access control list must be added to allow all MAC addresses.
Correct Answer: A
Question 217
Which feature is supported by IRB on Cisco FTD devices?
- A. Redundant interface
- B. High-availability cluster
- C. Dynamic routing protocol
- D. EtherChannel interface
Correct Answer: A
Question 218
A security analyst must create a new report within Cisco FMC to show an overview of the daily attacks, vulnerabilities, and connections. The analyst wants to reuse specific dashboards from other reports to create this consolidated one. Which action accomplishes this task?
- A. Copy the Malware Report and modify the sections to pull components from other reports.
- B. Create a new dashboard object via Object Management to represent the desired views.
- C. Use the import feature in the newly created report to select which dashboards to add.
- D. Modify the Custom Workflows within the Cisco FMC to feed the desired data into the new report.
Correct Answer: C
Question 219
Refer to the exhibit. A systems administrator conducts a connectivity test to their SCCM server from a host machine and gets no response from the server. Which action ensures that the ping packets reach the destination and that the host receives replies?
- A. Configure a custom Snort signature to allow ICMP traffic after inspection.
- B. Modify the Snort rules to allow ICMP traffic.
- C. Create an access control policy rule that allows ICMP traffic.
- D. Create an ICMP allow list and add the ICMP destination to remove it from the implicit deny list.
Correct Answer: C
Question 220
An administrator is setting up a Cisco FMC and must provide expert mode access for a security engineer. The engineer is permitted to use only a secured out-of-band network workstation with a static IP address to access the Cisco FMC. What must be configured to enable this access?
- A. Enable SSH and define an access list.
- B. Enable HTTPS and SNMP under the Access List section.
- C. Enable SCP under the Access List section.
- D. Enable HTTP and define an access list.
Correct Answer: A