Go Back on 300-710 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

300-710 Practice Test


Page 13 out of 51 Pages

Topic 3: Management and Troubleshooting

How many report templates does the Cisco Firepower Management Center support?


A.

20


B.

10


C.

5


D.

unlimited





D.
  

unlimited



Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmcconfig-
guide- v60/Working_with_Reports.html

Which command should be used on the Cisco FTD CLI to capture all the packets that hit
an interface?


A.

configure coredump packet-engine enable


B.

capture-traffic


C.

capture


D.

capture WORD





C.
  

capture



Reason: the command "capture-traffic" is used for SNORT Engine Captures. To capture a
LINA Engine Capture, you use the "capture" command. Since the Lina Engine represents
the actual physical interface of the device, "capture" is the only reasonable choice
Reference: https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-
working-with-firepower-threat-defense-f.html#anc10
The command is
firepower# capture DMZ interface dmz trace detail match ip host 192.168.76.14 host
192.168.76.100
firepower# capture INSIDE interface inside trace detail match ip host 192.168.76.14 host
192.168.75.14

A network administrator notices that remote access VPN users are not reachable from inside the network. It is determined that routing is configured correctly, however return traffic is entering the firewall but not leaving it What is the reason for this issue?


A.

A manual NAT exemption rule does not exist at the top of the NAT table.


 


B.

An external NAT IP address is not configured.


C.

An external NAT IP address is configured to match the wrong interface.


D.

An object NAT exemption rule does not exist at the top of the NAT table.





A.
  

A manual NAT exemption rule does not exist at the top of the NAT table.


 



Explanation: https://www.cisco.com/c/en/us/support/docs/security/firepower-managementcenter/212702-configure-and-verify-nat-on-ftd.html 

Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked?
(Choose two.)


A.

application blocking


B.

simple custom detection


C.

file repository


D.

exclusions


E.

application whitelisting





A.
  

application blocking



B.
  

simple custom detection



What is a valid Cisco AMP file disposition?


A.

non-malicious


B.

malware


C.

known-good


D.

pristine





B.
  

malware



Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmcconfig-
guide- v60/Reference_a_wrapper_Chapter_topic_here.html


Page 13 out of 51 Pages
Previous