New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free 300-710 Securing Networks with Cisco Firepower (300-710 SNCF) Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the Cisco 300-710 Exam the most current and reliable questions . To help people study, we've made some of our Securing Networks with Cisco Firepower (300-710 SNCF) exam materials available for free to everyone. You can take the Free 300-710 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

Users report that Cisco Duo 2FA fails when they attempt to connect to the VPN on a Cisco Secure Firewall Threat Defense (FTD) device IT staff have VPN profiles that do not require multifactor authentication and they can connect to the VPN without any issues When viewing the VPN troubleshooting log in Cisco Secure Firewall Management Centre (FMC), the network administrator sees an error in the Cisco Duo AAA server has been marked as tailed. What is the root cause of the Issue?

A.

Multifactor authentication Is not supported on Secure FMC managed devices.

B.

Duo trust certificates are missing from the Secure FTD device.

C.

The internal AD server is unreachable from the Secure FTD device.

D.

AD Trust certificates are missing from the Secure FTD device.

Question # 7

A security engineer needs to configure a network discovery policy on a Cisco FMC appliance and prevent excessive network discovery events from overloading the FMC database? Which action must be taken to accomplish this task?

A.

Change the network discovery method to TCP/SYN.

B.

Configure NetFlow exporters for monitored networks.

C.

Monitor only the default IPv4 and IPv6 network ranges.

D.

Exclude load balancers and NAT devices in the policy.

Question # 8

A network administrator manages a network with multiple firewalls in a datacenter using Cisco Secure Firepower Management Center. The administrator must change a next-generation firewall from routed to transparent mode. Which action must the administrator take next to meet the requirement?

A.

Deregister the firewall in Cisco Secure Firewall Management Center.

B.

Enter the configure transparent firewall command from the CLI.

C.

Create one or more bridge groups from the CLI.

D.

Manually delete the interface configuration from the CLI.

Question # 9

An engineer configures an access control rule that deploys file policy configurations to security zones or tunnel zones, and it causes the device to restart. What is the reason for the restart?

A.

Source or destination security zones in the access control rule matches the security zones that are associated with interfaces on the target devices.

B.

The source tunnel zone in the rule does not match a tunnel zone that is assigned to a tunnel rule in the destination policy.

C.

Source or destination security zones in the source tunnel zone do not match the security zones that are associated with interfaces on the target devices.

D.

The source tunnel zone in the rule does not match a tunnel zone that is assigned to a tunnel rule in the source policy.

Question # 10

An engineer is configuring a multidomain instance of Cisco Secure Firewall Management Center. The instance must be integrated with Cisco Secure Endpoint. What must the engineer configure to allow multiple domains to have hosts with the same IP-MAC address pairs?

A.

second-level domain

B.

leaf domain

C.

global domain

D.

subdomain

Question # 11

A network administrator is trying to convert from LDAP to LDAPS for VPN user authentication on a Cisco FTD. Which action must be taken on the Cisco FTD objects to accomplish this task?

A.

Add a Key Chain object to acquire the LDAPS certificate.

B.

Create a Certificate Enrollment object to get the LDAPS certificate needed.

C.

Identify the LDAPS cipher suite and use a Cipher Suite List object to define the Cisco FTD connection requirements.

D.

Modify the Policy List object to define the session requirements for LDAPS.

Question # 12

A network engineer must provide redundancy between two Cisco FTD devices. The redundancy configuration must include automatic configuration, translation, and connection updates. After the initial configuration of the two appliances, which two steps must be taken to proceed with the redundancy configuration? (Choose two.)

A.

Configure the virtual MAC address on the failover link.

B.

Disable hellos on the inside interface.

C.

Configure the standby IP addresses.

D.

Ensure the high availability license is enabled.

E.

Configure the failover link with stateful properties.

Question # 13

Which feature issupportedby IRB on Cisco FTD devices?

A.

redundant interface

B.

dynamic routing protocol

C.

EtherChannel interface

D.

high-availability cluster

Question # 14

An engineer is deploying a Cisco Secure Firewall Management Center appliance. The company must send data to Cisco Secure Network Analytics appliances. Which two actions must the engineer take? (Choose two.)

A.

Configure Security Intelligence object to send data to Cisco Secure Network Analytics.

B.

Add the Netflow_Send_Destination object to the configuration.

C.

Add the Netflow_Add_Destination object to the configuration.

D.

Add the Netflow_Set_Parameters object to the configuration.

E.

Create a service identifier to enable the NetFlow service.

Question # 15

What is a limitation to consider when running a dynamic routing protocol on a Cisco FTD device in IRB mode?

A.

Only link-stale routing protocols are supported.

B.

Only distance vector routing protocols are supported.

C.

Only EtherChannel interfaces are supposed.

D.

Only nonbridge interfaces are supported.

Question # 16

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

A.

Traffic inspection can be interrupted temporarily when configuration changes are deployed.

B.

The system performs intrusion inspection followed by file inspection.

C.

They can block traffic based on Security Intelligence data.

D.

File policies use an associated variable set to perform intrusion prevention.

E.

The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.

Question # 17

An engineer is attempting to create a new dashboard within the Cisco FMC to have a single view with widgets from many of the other dashboards. The goal is to have a mixture of threat and security related widgets along with Cisco Firepower device health information. Which two widgets must be configured to provide this information? (Choose two).

A.

Intrusion Events

B.

Correlation Information

C.

Appliance Status

D.

Current Sessions

E.

Network Compliance

Question # 18

What is the advantage of having Cisco Firepower devices send events to Cisco Threat response via the security services exchange portal directly as opposed to using syslog?

A.

Firepower devices do not need to be connected to the internet.

B.

All types of Firepower devices are supported.

C.

Supports all devices that are running supported versions of Firepower

D.

An on-premises proxy server does not need to set up and maintained

Question # 19

An engineermustconfigure a Cisco FMC dashboard in a multidomain deployment Which action must the engineer take to edit a report template from an ancestor domain?

A.

Add it as a separate widget.

B.

Copy it to the current domain

C.

Assign themselves ownership of it

D.

Change the document attributes.

Question # 20

administrator is configuring SNORT inspection policies and is seeing failed deployment messages in Cisco FMC . What information should the administrator generate for Cisco TAC to help troubleshoot?

A.

A Troubleshoot" file for the device in question.

B.

A "show tech" file for the device in question

C.

A "show tech" for the Cisco FMC.

D.

A "troubleshoot" file for the Cisco FMC

Question # 21

An engineer defines a new rule while configuring an Access Control Policy. After deploying the policy, the rule is not working as expected and the hit counters associated with the rule are showing zero. What is causing this error?

A.

Logging is not enabled for the rule.

B.

The rule was not enabled after being created.

C.

The wrong source interface for Snort was selected in the rule.

D.

An incorrect application signature was used in the rule.

Question # 22

A network administrator is configuring a site-to-site IPsec VPN to a router sitting behind a Cisco FTD. The administrator has configured an access policy to allow traffic to this device on UDP 500, 4500, and ESP VPN traffic is not working. Which action resolves this issue?

A.

Set the allow action in the access policy to trust.

B.

Enable IPsec inspection on the access policy.

C.

Modify the NAT policy to use the interface PAT.

D.

Change the access policy to allow all ports.

Question # 23

A network engineer is extending a user segment through an FTD device for traffic inspection without creating another IP subnet How is this accomplished on an FTD device in routed mode?

A.

by leveraging the ARP to direct traffic through the firewall

B.

by assigning an inline set interface

C.

by using a BVI and create a BVI IP address in the same subnet as the user segment

D.

by bypassing protocol inspection by leveraging pre-filter rules

Question # 24

An administrator receives reports that users cannot access a cloud-hosted web server. The access control policy was recently updated with several new policy additions and URL filtering. What must be done to troubleshoot the issue and restore access without sacrificing the organization's security posture?

A.

Create a new access control policy rule to allow ports 80 and 443 to the FQDN of the web server.

B.

Identify the blocked traffic in the Cisco FMC connection events to validate the block, and modify the policy to allow the traffic to the web server.

C.

Verify the blocks using the packet capture tool and create a rule with the action monitor for the traffic.

D.

Download a PCAP of the traffic attempts to verify the blocks and use the flexconfig objects to create a rule that allows only the required traffic to the destination server.

Question # 25

IT management is asking the network engineer to provide high-level summary statistics of the Cisco FTD appliance in the network. The business is approaching a peak season so the need to maintain business uptime is high. Which report type should be used to gather this information?

A.

Malware Report

B.

Standard Report

C.

SNMP Report

D.

Risk Report

Question # 26

A network administrator is trying to configure an access rule to allow access to a specific banking site over HTTPS. Which method must the administrator use to meet the requirement?

A.

Enable SSL decryption and specify the URL.

B.

Define the URL to be blocked and set the application to HTTP.

C.

Define the URL to be blocked and disable SSL inspection.

D.

Block the category of banking and define the application of WWW.

Question # 27

Which interface type allows packets to be dropped?

A.

passive

B.

inline

C.

ERSPAN

D.

TAP

Question # 28

An analyst using the security analyst account permissions is trying to view the Correlations Events Widget but is not able to access it. However, other dashboards are accessible. Why is this occurring?

A.

An API restriction within the Cisco FMC is preventing the widget from displaying.

B.

The widget is configured to display only when active events are present.

C.

The widget is not configured within the Cisco FMC.

D.

The security analyst role does not have permission to view this widget.

Question # 29

An engineer is deploying Cisco Secure Endpoint for the first time and on endpoint with MAC address 50:54:15:04:0:AB. The engineer must make sure that during the testing phase no files are isolated and network connections must not be blocked. Which policy type must be configured to accomplish the task?

A.

Triage

B.

Quarantine

C.

Protect

D.

Audit

Question # 30

What is the role of realms in the Cisco ISE and Cisco FMC integration?

A.

AD definition

B.

TACACS+ database

C.

Cisco ISE context

D.

Cisco Secure Firewall VDC

Question # 31

An engineer must configure a correlation policy in Cisco Secure Firewall Management Center to detect when an IP address from an internal network communicates with a known malicious host. Connections made by the internal IP addresses must be tracked, and an external dynamic list must be used for the condition. Which type of event must the engineer configure on the correlation policy?

A.

Intrusion Impact Alert

B.

Connection tracker

C.

Network discovery

D.

Malware

Question # 32

A VPN user is unable to conned lo web resources behind the Cisco FTD device terminating the connection. While troubleshooting, the network administrator determines that the DNS responses are not getting through the Cisco FTD What must be done to address this issue while still utilizing Snort IPS rules?

A.

Uncheck the "Drop when Inline" box in the intrusion policy to allow the traffic.

B.

Modify the Snort rules to allow legitimate DNS traffic to the VPN users.

C.

Disable the intrusion rule threshes to optimize the Snort processing.

D.

Decrypt the packet after the VPN flow so the DNS queries are not inspected

Question # 33

An administrator is attempting to add a new FTD device to their FMC behind a NAT device with a NAT ID of NAT001 and a password of Cisco0420l06525. The private IP address of the FMC server is 192.168.45.45. which is being translated to the public IP address of 209.165.200.225/27. Which command set must be used in order to accomplish this task?

A.

configure manager add 209.165.200.225

B.

configure manager add 192.168.45,45

C.

configure manager add 209.165.200.225 255.255.255.224

D.

configure manager add 209.165.200.225/27

Question # 34

Which protocol is needed to exchange threat details in rapid threat containment on Cisco FMC?

A.

SGT

B.

SNMP v3

C.

BFD

D.

pxGrid

Question # 35

Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?

A.

Windows domain controller

B.

audit

C.

triage

D.

protection

Question # 36

What is a valid Cisco AMP file disposition?

A.

non-malicious

B.

malware

C.

known-good

D.

pristine

Question # 37

What are the minimum requirements to deploy a managed device inline?

A.

inline interfaces, security zones, MTU, and mode

B.

passive interface, MTU, and mode

C.

inline interfaces, MTU, and mode

D.

passive interface, security zone, MTU, and mode

Question # 38

A company is in the process of deploying intrusion protection with Cisco FTDs managed by a Cisco FMC. Which action must be selected to enable fewer rules detect only critical conditions and avoid false positives?

A.

Connectivity Over Security

B.

Balanced Security and Connectivity

C.

Maximum Detection

D.

No Rules Active

Question # 39

300-710 question answer

Refer to the exhibit. An engineer must import three network objects into the Cisco Secure Firewall Management Center by using a CSV file. Which header must be configured in the CSV file to accomplish the task?

A.

NAME;DESCRIPTION;TYPE;VALUE;LOOKUP;

B.

Name; Description; Type;Value;Lookup;

C.

Name; Description; Type;Value;DN;

D.

NAME;DESCRIPTION; TYPE;VALUE;DN;

Question # 40

An engineer must integrate a thud-party security Intelligence teed with Cisco Secure Firewall Management Center. Secure Firewall Management Center is running Version 6.2 3 and has 8 GB of memory. Which two actions must be taken to implement Throat Intelligence Director? (Choose two.)

A.

Upgrade to version 6.6.

B.

Enable REST API access.

C.

Add the URL of the TAXII server.

D.

Add 7 GB of memory.

E.

Add a TAXII server

Question # 41

A network engineer wants to add a third-party threat feed into the Cisco FMC for enhanced threat detectionWhich action should be taken to accomplish this goal?

A.

Enable Threat Intelligence Director using STIX and TAXII

B.

Enable Rapid Threat Containment using REST APIs

C.

Enable Threat Intelligence Director using REST APIs

D.

Enable Rapid Threat Containment using STIX and TAXII

Question # 42

An administrator is working on a migration from Cisco ASA to the Cisco FTD appliance and needs to test the rules without disrupting the traffic. Which policy type should be used to configure the ASA rules during this phase of the migration?

A.

identity

B.

Intrusion

C.

Access Control

D.

Prefilter

Question # 43

Which component simplifies incident investigation with Cisco Threat Response?

A.

Cisco AMP client

B.

local CVE database

C.

Cisco Secure Firewall appliance

D.

browser plug-in

Question # 44

An organization wants to secure traffic from their branch office to the headquarter building using Cisco Firepower devices, They want to ensure that their Cisco Firepower devices are not wasting resources on inspecting the VPN traffic. What must be done to meet these requirements?

A.

Configure the Cisco Firepower devices to ignore the VPN traffic using prefilter policies

B.

Enable a flexconfig policy to re-classify VPN traffic so that it no longer appears as interesting traffic

C.

Configure the Cisco Firepower devices to bypass the access control policies for VPN traffic.

D.

Tune the intrusion policies in order to allow the VPN traffic through without inspection

Question # 45

After using Firepower for some time and learning about how it interacts with the network, an administrator is trying to correlate malicious activity with a user Which widget should be configured to provide this visibility on the Cisco Firepower dashboards?

A.

Custom Analysis

B.

Current Status

C.

Current Sessions

D.

Correlation Events

Question # 46

A security engineer must deploy a Cisco FTD appliance as a bump in the wire to detect intrusion events without disrupting the flow of network traffic. Which two features must be configured to accomplish the task? (Choose two.)

A.

inline set pair

B.

transparent mode

C.

tapemode

D.

passive interfaces

E.

bridged mode

Question # 47

An engineer must build redundancy into the network and traffic must continuously flow if a redundant switch in front of the firewall goes down. What must be configured to accomplish this task?

A.

redundant interfaces on the firewall cluster mode and switches

B.

redundant interfaces on the firewall noncluster mode and switches

C.

vPC on the switches to the interface mode on the firewall duster

D.

vPC on the switches to the span EtherChannel on the firewall cluster

Question # 48

An engineer is troubleshooting the upgrade of a Cisco Secure Firewall Threat Defense device on the Secure Firewall Management Center 7.0 GUI. The engineer wants to collect the upgrade data and logs. Which two actions must the engineer take? (Choose two.)

A.

View the system and troubleshooting details.

B.

Select the Secure Firewall Threat Defense device properties.

C.

Select the Secure Firewall Management Center device.

D.

Access the Health Events page.

E.

Access the Health Monitor page.

Question # 49

300-710 question answer

Refer to the exhibit. An engineer is configuring a high-availability solution that has the hardware devices and software versions:

two Cisco Secure Firewall 9300 Security Appliances with FXOS SW 2.0(1.23)

software Cisco Secure Firewall Threat Defense 6.0.1.1 (build 1023) on both appliances

one Cisco Secure Firewall Management Center with SW 6.0.1.1 (build 1023)

Which condition must be met to complete the high-availability configuration?

A.

DHCP must be configured on at least one firewall interface.

B.

The version numbers must have the same patch number.

C.

Both firewalls must have the same number of interfaces.

D.

Both firewalls must be in transparent mode.

Question # 50

An engineer is troubleshooting an intermittent connectivity issue on a Cisco Secure Firewall Threat Defense appliance and must collect 24 hours' worth of data. The engineer started a packet capture. Whenever it stopsprematurely during this time period. The engineer notices that the packet capture butter size is set to the default of 32 MB Which butter S170 is the maximum that the engineer must sot to able the packet capture to run successfully?

A.

64 MB

B.

1 GB

C.

10 GB

D.

100 GB

Question # 51

Which protocol establishes network redundancy in a switched Firepower device deployment?

A.

STP

B.

HSRP

C.

GLBP

D.

VRRP

Question # 52

A hospital network needs to upgrade their Cisco FMC managed devices and needs to ensure that a disaster recovery process is in place. What must be done in order to minimize downtime on the network?

A.

Configure a second circuit to an ISP for added redundancy

B.

Keep a copy of the current configuration to use as backup

C.

Configure the Cisco FMCs for failover

D.

Configure the Cisco FMC managed devices for clustering.

Question # 53

Which feature sets up multiple interfaces on a Cisco Secure Firewall Threat Defense to be on the same subnet?

A.

EtherChannel

B.

SVI

C.

BVI

D.

security levels

Question # 54

Which action must be taken on the Cisco FMC when a packet bypass is configured in case the Snort engine is down or a packet takes too long to process?

A.

Enable Inspect Local Router Traffic

B.

Enable Automatic Application Bypass

C.

Configure Fastpath rules to bypass inspection

D.

Add a Bypass Threshold policy for failures

Question # 55

An administrator is configuring the interface of a Cisco Secure Firewall Threat Defense device in a passive IPS deployment. The device and interface have been identified. Which set of configuration steps of the administrator take next to complete the implementation?

A.

Set the interface mode to passive. Associate the interface with a security zone. Set the MTU parameter. Reset the interface.

B.

Modify the interface to retransmit received traffic. Associate the interface with a security zone Enable the interface. Sat the MTU parameter.

C.

Modify the interface to retransmit received traffic. Associate the interface with a security zone. Set the MTU parameter.

D.

Set the interface mode to passive. Associate the interface with a security zone. Enable the interface. Set the MTU parameter.

Question # 56

300-710 question answer

Refer to the exhibit. A security engineer views the health alerts in Cisco Secure Firewall Management Center by using the Health Monitor in the web interface. One of the alerts shows an appliance as critical because the Time Synchronization module status is out of sync. To troubleshoot the issue, the engineer runs the ntpq command in Secure Firewall Management Center. The output is shown in the exhibit. Which action must the security engineer take next to resolve the issue?

A.

Reset the appliance with a hard reboot.

B.

Reestablish the connection to the timeserver.

C.

Configure the appliance to receive the time from an NTP server.

D.

Configure the appliance to sync with its own internal clock.

Question # 57

A network administrator reviews me attack risk report and notices several Low-Impact attacks. What does this type of attack indicate?

A.

All attacks are listed as low until manually categorized.

B.

The host is not vulnerable to those attacks.

C.

The attacks are not dangerous to the network.

D.

The host is not within the administrator's environment.

Question # 58

Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)

A.

An option to re-apply NAT and VPN policies during registration is available, so users do not need to re- apply the policies after registration is completed.

B.

Before re-adding the device in Cisco FMC, you must add the manager back in the device.

C.

No option to delete and re-add a device is available in the Cisco FMC web interface.

D.

The Cisco FMC web interface prompts users to re-apply access control policies.

E.

No option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the policies after registration is completed.

Question # 59

The administrator notices that there is malware present with an .exe extension and needs to verify if any of the systems on the network are running the executable file. What must be configured within Cisco AMP for Endpoints to show this data?

A.

prevalence

B.

threat root cause

C.

vulnerable software

D.

file analysis

Question # 60

Which two packet captures does the FTD LINA engine support? (Choose two.)

A.

Layer 7 network ID

B.

source IP

C.

application ID

D.

dynamic firewall importing

E.

protocol

Question # 61

An engineer is configuring URL filtering tor a Cisco Secure Firewall Threat Defense device in Cisco Secure Firewall Management Centre. Use's must receive a warning when they access

..wwww badaduitsito com with the option of continuing to the website if they choose to No other websites should he blocked. Which two actions must the engineer take to moot these requirements?

A.

Configure an access control rule that matches an URL object for http://www.Dadadullsile.com ' and set the action to Interactive Block.

B.

On the HTTP Responses tab of the access control policy editor, set the Interactive Block Response Page to System-provided.

C.

Configure the default action for the access control policy to Interactive Block.

D.

On the HTTP Responses tab of the access control policy editor set the Block Response Page to Custom.

E.

Configure an access control rule that matches the Adult URL category and sot the action to Interactive Block

Question # 62

A network administrator is concerned about (he high number of malware files affecting users' machines. What must be done within the access control policy in Cisco FMC to address this concern?

A.

Create an intrusion policy and set the access control policy to block.

B.

Create an intrusion policy and set the access control policy to allow.

C.

Create a file policy and set the access control policy to allow.

D.

Create a file policy and set the access control policy to block.

Question # 63

An engineer is configuring two new Cisco FTD devices to replace the existing high availability firewall pair in a highly secure environment. The information exchanged between the FTD devices over the failover link must be encrypted. Which protocol supports this on the Cisco FTD?

A.

IPsec

B.

SSH

C.

SSL

D.

MACsec

Question # 64

Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)

A.

The units must be the same version

B.

Both devices can be part of a different group that must be in the same domain when configured within the FMC.

C.

The units must be different models if they are part of the same series.

D.

The units must be configured only for firewall routed mode.

E.

The units must be the same model.

Question # 65

An administrator is optimizing the Cisco FTD rules to improve network performance, and wants to bypass inspection for certain traffic types to reduce the load on the Cisco FTD. Which policy must be configured to accomplish this goal?

A.

prefilter

B.

intrusion

C.

identity

D.

URL filtering

Question # 66

A network administrator wants to configure a Cisco Secure Firewall Threat Defense instance managed by Cisco Secure Firewall Management Center to block traffic to known cryptomning networks. Which system settings must the administrator configure in Secure Firewall Management Center to meet the requirement?

A.

Access Policy. Security Intelligence

B.

Malware Policy.

C.

Rules Intrusion Policy. Security Intelligence

D.

Access Policy. Rules

Question # 67

While configuring FTD, a network engineer wants to ensure that traffic passing through the appliance does not require routing or Vlan rewriting. Which interface mode should the engineer implement to accomplish this task?

A.

passive

B.

transparent

C.

Inline tap

D.

Inline set

Question # 68

An administrator is configuring a new report template off. of a saved search within Cisco Secure Firewall Management Centre. The goal is to use the malware analysis report template, but use a different type saved search as the basis. The report is not working. What must be considered when configuring this report template?

A.

Saved searches can be used for the same report template only

B.

Saved searches are available freely for all report templates within the same domain.

C.

Saved searches from a different report template must be used.

D.

Saved searches must be renamed before using for different report template.

Question # 69

Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choosetwo.)

A.

OSPFv2 with IPv6 capabilities

B.

virtual links

C.

SHA authentication to OSPF packets

D.

area boundary router type 1 LSA filtering

E.

MD5 authentication to OSPF packets

Question # 70

300-710 question answer

Refer to the exhibit. An engineer analyzes a Network Risk Report from Cisco Secure Firewall Management Center. What should the engineer recommend implementing to mitigate the risk?

A.

IP address and URL blacklisting

B.

Trend analysis

C.

Network-based detection

D.

Virtual protection

Question # 71

An engineer has been tasked with providing disaster recovery for an organization's primary Cisco FMC. What must be done on the primary and secondary Cisco FMCs to ensure that a copy of the original corporate policy is available if the primary Cisco FMC fails?

A.

Configure high-availability in both the primary and secondary Cisco FMCs

B.

Connect the primary and secondary Cisco FMC devices with Category 6 cables of not more than 10 meters in length.

C.

Place the active Cisco FMC device on the same trusted management network as the standby device

D.

Restore the primary Cisco FMC backup configuration to the secondary Cisco FMC device when the primary device fails

Question # 72

300-710 question answer

300-710 question answer

300-710 question answer

Refer to the exhibit. An engineer analyzes a Cisco Firepower Management Center dashboard. Which action must be taken by the user to decrease the risk of data loss?

A.

Stop all URLs that have an unknown reputation.

B.

Block the use of Dropbox.

C.

Stop all the URLs that are uncategorized.

D.

Block all the BitTorrent applications.

Question # 73

An engineer is configuring a custom intrusion rule on Cisco FMC. The engineer needs the rule to search the payload or stream for the string "|45 5* 26 27 4 0A|*. Which Keyword must the engineer use with this stung lo create an argument for packed inspection?

A.

metadata

B.

Content

C.

Protected _ content

D.

data

Question # 74

A network administrator is seeing an unknown verdict for a file detected by Cisco FTD. Which malware policy configuration option must be selected in order to further analyse the file in the Talos cloud?

A.

Spero analysis

B.

Malware analysis

C.

Dynamic analysis

D.

Sandbox analysis

Question # 75

300-710 question answer

Refer to the exhibit. An engineer is deploying a new instance of Cisco Secure Firewall Threat Defense. Which action must the engineer take next so that Client_A and Client_B receive an IP address via DHCP from Server_A?

A.

Disable Option 82 in the DHCP relay configuration properties using Secure Firewall Management Center.

B.

Add access rules that allow DHCP traffic by using Cisco Secure Firewall Management Center.

C.

Add another DHCP pool on Server_A with DHCP relay on Secure Firewall Threat Defense.

D.

Disable all the DHCP Snort rules by using Secure Firewall Device Manager.

Question # 76

An engineer must deploy a Cisco FTD device. Management wants to examine traffic without requiring network changes that will disrupt end users. Corporate security policy requires the separation of management traffic from data traffic and the use of SSH over Telnet for remote administration. How must the device be deployed to meet these requirements?

A.

in routed mode with a diagnostic interface

B.

in transparent mode with a management Interface

C.

in transparent made with a data interface

D.

in routed mode with a bridge virtual interface

Question # 77

An engineer Is configuring a Cisco FTD device to place on the Finance VLAN to provide additional protection tor company financial data. The device must be deployed without requiring any changes on the end user workstations, which currently use DHCP lo obtain an IP address. How must the engineer deploy the device to meet this requirement?

A.

Deploy the device in routed mode and allow DHCP traffic in the access control policies.

B.

Deploy the device in routed made aid enable the DHCP Relay feature.

C.

Deploy the device in transparent mode and allow DHCP traffic in the access control policies

D.

Deploy the device in transparent mode and enable the DHCP Server feature.

Question # 78

An engineer must create an access control policy on a Cisco Secure Firewall Threat Defense device. The company has a contact center that utilizes VoIP heavily, and it is critical that this traffic is not …. by performance issues after deploying the access control policy Which access control Action rule must be configured to handle the VoIP traffic?

A.

monitor

B.

trust

C.

block

D.

allow

Question # 79

An engineer is setting up a new Cisco Secure Firewall Threat Defense appliance to replace the current firewall. The company requests that inline sets be used and that when one interface in

an inline set goes down, the second interface in the inline set goes down. What must the engineer configure to meet the deployment requirements?

A.

strict TCP enforcement

B.

propagate link state

C.

Snort fail open

D.

inline tap mode

Question # 80

Which two actions can be used in an access control policy rule? (Choose two.)

A.

Block with Reset

B.

Monitor

C.

Analyze

D.

Discover

E.

Block ALL

Question # 81

An engineer is configuring a new dashboard within Cisco Secure Firewall Management Center and is having trouble implementing a custom widget. When a custom analysis widget is configured which option is mandatory for the system to display the information?

A.

table

B.

filter

C.

title

D.

results

Question # 82

A cisco Secure firewall Threat Defence device is configured in inline IPS mode to inspect all traffic that passes through the interfaces in the inline set. Which setting in the inline set configuration must be connected to allow traffic to pass through uninterrupted when VDB updates are being applied?

A.

Propagate Link State

B.

Short Fall Open

C.

Strict TCP Enforcement

D.

Tap Mode

Question # 83

A network engineer sets up a secondary CiscoFMC that is integrated with Cisco Security Packet Analyzer What occurs when the secondary CiscoFMC synchronizes with the primary Cisco FMC?

A.

The existing integration configuration is replicated to the primary Cisco FMC

B.

The existing configuration for integration of the secondary Cisco FMC the Cisco Security Packet Analyzer is overwritten.

C.

The synchronization between the primary and secondary Cisco FMC fails

D.

The secondary Cisco FMC must be reintegrated with the Cisco Security Packet Analyzer after the synchronization

Question # 84

An engineer is investigating connectivity problems on Cisco Firepower that is using service group tags. Specific devices are not being tagged correctly, which is preventing clients from using the proper policies when going through the firewall How is this issue resolved?

A.

Use traceroute with advanced options.

B.

Use Wireshark with an IP subnet filter.

C.

Use a packet capture with match criteria.

D.

Use a packet sniffer with correct filtering

Question # 85

An engineer must configure a Cisco FMC dashboard in a child domain. Which action must be taken so that the dashboard is visible to the parent domain?

A.

Add a separate tab.

B.

Adjust policy inheritance settings.

C.

Add a separate widget.

D.

Create a copy of the dashboard.

Question # 86

An engineer is creating an URL object on Cisco FMC How must it be configured so that the object will match for HTTPS traffic in an access control policy?

A.

Specify the protocol to match (HTTP or HTTPS).

B.

Use the FQDN including the subdomain for the website

C.

Define the path to the individual webpage that uses HTTPS.

D.

Use the subject common name from the website certificate

Question # 87

What is a functionality of port objects in Cisco FMC?

A.

to mix transport protocols when setting both source and destination port conditions in a rule

B.

to represent protocols other than TCP, UDP, and ICMP

C.

to represent all protocols in the same way

D.

to add any protocol other than TCP or UDP for source port conditions in access control rules.

Question # 88

Which firewall design will allow It to forward traffic at layers 2 and 3 for the same subnet?

A.

Cisco Firepower Threat Defense mode

B.

routed mode

C.

Integrated routing and bridging

D.

transparent mode

Question # 89

A network engineer is deploying a Cisco Firepower 4100 appliance and must configure a multi-instance environment for high availability. Drag and drop me actions from the left into sequence on the right far this configuration.

300-710 question answer

Question # 90

An engineer is configuring multiple Cisco FTD appliances (or use in the network. Which rule must the engineer follow while defining interface objects in Cisco FMC for use with interfaces across multiple devices?

A.

An interface cannot belong to a security zone and an interface group

B.

Interface groups can contain multiple interface types

C.

Interface groups can contain interfaces from many devices.

D.

Two security zones can contain the same interface

Question # 91

Which firewall design allows a firewall to forward traffic at layer 2 and layer 3 for the same subnet?

A.

Cisco Firepower Threat Defense mode

B.

transparent mode

C.

routed mode

D.

integrated routing and bridging

Question # 92

An administrator is configuring their transparent Cisco FTD device to receive ERSPAN traffic from multiple switches on a passive port, but the Cisco FTD is not processing the traffic. What is the problem?

A.

The switches do not have Layer 3 connectivity to the FTD device for GRE traffic transmission.

B.

The switches were not set up with a monitor session ID that matches the flow ID defined on the CiscoFTD.

C.

The Cisco FTD must be in routed mode to process ERSPAN traffic.

D.

The Cisco FTD must be configured with an ERSPAN port not a passive port.

Question # 93

A network engineer is planning on replacing an Active/Standby pair of physical Cisco Secure Firewall ASAs with a pair of Cisco Secure Firewall Threat Defense Virtual appliances. Which two virtual environments support the current High Availability configuration? (Choose two.)

A.

KVM

B.

Azure

C.

ESXi

D.

AWS

E.

Openstack

Question # 94

Refer to the exhibit.

300-710 question answer

A Cisco Secure Firewall Threat Defense (FTD) device is deployed in inline mode with an inline set. The network engineer wants router R2 to remove the directly connected route M 68.1.0/24 from its routing table when the cable between routed R1 and the Secure FTD device Is disconnected. Which action must the engineer take?

1

A.

Implement the Propagate Link Stale option on the Secure FTD device

B.

Establish a routing protocol between R1 and R2.

C.

Disable hardware bypass on the Secure FTD device.

D.

Implement autostate functionality on the Gi0/2 interface of R2

Question # 95

A network engineer must configure the cabling between a Cisco Secure Firewall Threat Defense appliance and a network so the Secure Firewall Threat Defense appliance performs inline to analyze and tune generated intrusion events before going live. Which Secure Firewall Threat Defense interface mode must the engineer use?

A.

bypass

B.

link state propagation

C.

tap mode

D.

strict TCP enforcement

Question # 96

What is the RTC workflow when the infected endpoint is identified?

A.

Cisco ISE instructs Cisco AMP to contain the infected endpoint.

B.

Cisco ISE instructs Cisco FMC to contain the infected endpoint.

C.

Cisco AMP instructs Cisco FMC to contain the infected endpoint.

D.

Cisco FMC instructs Cisco ISE to contain the infected endpoint.

Question # 97

Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)

A.

Redundant Interface

B.

EtherChannel

C.

Speed

D.

Media Type

E.

Duplex

Question # 98

A network administrator wants to block traffictoa known malware site athttps://www.badsite.comand all subdomains while ensuring no packets from any internal client are sent to that site. Which type of policy must the network administrator use to accomplish this goal?

A.

Prefilter policy

B.

SSL policy

C.

DNS policy

D.

Access Control policy with URL filtering

Question # 99

A network administrator is deploying a new Cisco Secure Firewall Threat Defense (FTD) firewall After Cisco Secure FTD is deployed, inside clients nave intermittent connectivity to each other. When … the packet capture on the Secure FTD firewall, the administrator sees that Secure FID is responding to all the AW requests on the inside network. Which action must the network administrator e to resolve the issue''

A.

Review NAT policy and disable incorrect proxy ARP configuration.

B.

Hardcode the MAC address of the FTD to IP mapping on client machines.

C.

Review the access policy and verify that ARP is allowed from inside to inside.

D.

Convert the FTD to transparent mode to allow ARP requests.

Question # 100

300-710 question answer

A security engineer must improve security in an organization and is producing a risk mitigation strategy to present to management for approval. Which action must the security engineer take based on this Attacks Risk Report?

A.

Inspect DNS traffic

B.

Block NetBIOS.

C.

Block Internal Explorer

D.

Inspect TCP port 80 traffic

Question # 101

Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?

A.

configure manager local 10.0.0.10 Cisco123

B.

configure manager add Cisco123 10.0.0.10

C.

configure manager local Cisco123 10.0.0.10

D.

configure manager add 10.0.0.10 Cisco123

Question # 102

An administrator configures the interfaces of a Cisco Secure Firewall Threat Defence device in an inline IPS deployment. The administrator completes these actions:

* identifies the device and the interfaces

* sets the interface mode to inline

* enables the interlaces

Which configuration step must the administrator take next to complete the implementation?

A.

Enable spanning-tree PortFast on the interfaces.

B.

Configure an inline set

C.

Set the interface to Transparent mode.

D.

Set the interface to routed mode.

Question # 103

Encrypted Visibility Engine (EVE) is enabled under which lab on an access control policy in Cisco Secure Firewall Management Centre?

A.

Network Analysis Policy

B.

Advanced

C.

Security Intelligence

D.

SSL

Question # 104

What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?

A.

VPN connections can be re-established only if the failed master unit recovers.

B.

Smart License is required to maintain VPN connections simultaneously across all cluster units.

C.

VPN connections must be re-established when a new master unit is elected.

D.

Only established VPN connections are maintained when a new master unit is elected.

Question # 105

An organization has a Cisco FTD that uses bridge groups to pass traffic from the inside interfaces to the outside interfaces. They are unable to gather information about neighbouring Cisco devices or use multicast in their environment. What must be done to resolve this issue?

A.

Create a firewall rule to allow CDP traffic.

B.

Create a bridge group with the firewall interfaces.

C.

Change the firewall mode to transparent.

D.

Change the firewall mode to routed.

Question # 106

An organization does not want to use the default Cisco Firepower block page when blocking HTTP traffic. The organization wants to include information about its policies and procedures to help educate the users whenever a block occurs. Which two steps must be taken to meet these requirements? (Choose two.)

A.

Modify the system-provided block page result using Python.

B.

Create HTML code with the information for the policies and procedures.

C.

Edit the HTTP request handling in the access control policy to customized block.

D.

Write CSS code with the information for the policies and procedures.

E.

Change the HTTP response in the access control policy to custom.

Question # 107

Which firewall mode is Cisco Secure Firewall Threat Defense in when two physical interfaces are assigned to a named BVI?

A.

Routed

B.

Transparent

C.

In-line

D.

IPS only

Question # 108

An analyst is investigating a potentially compromised endpoint within the network and pulls a host report for the endpoint in question to collect metrics and documentation. What information should be taken from this report for the investigation?

A.

client applications by user, web applications, and user connections

B.

number of attacked machines, sources of the attack, and traffic patterns

C.

intrusion events, host connections, and user sessions

D.

threat detections over time and application protocols transferring malware

Question # 109

Which feature within the Cisco FMC web interface allows for detecting, analyzing and blocking malware in network traffic?

A.

intrusion and file events

B.

Cisco AMP for Endpoints

C.

Cisco AMP for Networks

D.

file policies

Question # 110

A company is deploying intrusion protection on multiple Cisco FTD appliances managed by Cisco FMC. Which system-provided policy must be selected if speed and detection are priorities?

A.

Connectivity Over Security

B.

Security Over Connectivity

C.

Maximum Detection

D.

Balanced Security and Connectivity

Question # 111

An engineer is deploying failover capabilities for a pair of Cisco Secure Firewall devices. The core switch keeps the MAC address of the previously active unit in the ARP table. Which action must the engineer take to minimize downtime and ensure that network users keep access to the internet after a Cisco Secure Firewall failover?

A.

Set the same MAC address on both units.

B.

Add the MAC address to the switch ARP table.

C.

Run a script to send gratuitous ARP after a failover.

D.

Use a virtual MAC address on both units.

Question # 112

An engineer is configuring Cisco FMC and wants to allow multiple physical interfaces to be part of the same VLAN. The managed devices must be able to perform Layer 2 switching between interfaces, including sub-interfaces. What must be configured to meet these requirements?

A.

interface-based VLAN switching

B.

inter-chassis clustering VLAN

C.

integrated routing and bridging

D.

Cisco ISE Security Group Tag

Question # 113

What is the result when two users modify a VPN policy at the same lime on a Cisco Secure Firewall Management Center managed device?

A.

Both users can edit the policy arid the last saved configuration persists.

B.

The first user locks the configuration when selecting edit on the policy.

C.

The changes from both users will be merged together into the policy.

D.

The system prevents modifications to the policy by multiple users.

Question # 114

When do you need the file-size command option during troubleshooting with packet capture?

A.

when capture packets are less than 16 MB

B.

when capture packets are restricted from the secondary memory

C.

when capture packets exceed 10 GB

D.

when capture packets exceed 32 MB

Question # 115

What is a behavior of a Cisco FMC database purge?

A.

User login and history data are removed from the database if the User Activity check box is selected.

B.

Data can be recovered from the device.

C.

The appropriate process is restarted.

D.

The specified data is removed from Cisco FMC and kept for two weeks.

300-710 PDF

$42

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

300-710 PDF + Testing Engine

$57

$189.99

3 Months Free Update

  • Exam Name: Securing Networks with Cisco Firepower (300-710 SNCF)
  • Last Update: Dec 14, 2025
  • Questions and Answers: 385
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

300-710 Engine

$48

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included