Topic 3: Management and Troubleshooting
How many report templates does the Cisco Firepower Management Center support?
A.
20
B.
10
C.
5
D.
unlimited
unlimited
Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmcconfig-
guide- v60/Working_with_Reports.html
Which command should be used on the Cisco FTD CLI to capture all the packets that hit
an interface?
A.
configure coredump packet-engine enable
B.
capture-traffic
C.
capture
D.
capture WORD
capture
Reason: the command "capture-traffic" is used for SNORT Engine Captures. To capture a
LINA Engine Capture, you use the "capture" command. Since the Lina Engine represents
the actual physical interface of the device, "capture" is the only reasonable choice
Reference: https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-
working-with-firepower-threat-defense-f.html#anc10
The command is
firepower# capture DMZ interface dmz trace detail match ip host 192.168.76.14 host
192.168.76.100
firepower# capture INSIDE interface inside trace detail match ip host 192.168.76.14 host
192.168.75.14
A network administrator notices that remote access VPN users are not reachable from inside the network. It is determined that routing is configured correctly, however return traffic is entering the firewall but not leaving it What is the reason for this issue?
A.
A manual NAT exemption rule does not exist at the top of the NAT table.
B.
An external NAT IP address is not configured.
C.
An external NAT IP address is configured to match the wrong interface.
D.
An object NAT exemption rule does not exist at the top of the NAT table.
A manual NAT exemption rule does not exist at the top of the NAT table.
Explanation: https://www.cisco.com/c/en/us/support/docs/security/firepower-managementcenter/212702-configure-and-verify-nat-on-ftd.html
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked?
(Choose two.)
A.
application blocking
B.
simple custom detection
C.
file repository
D.
exclusions
E.
application whitelisting
application blocking
simple custom detection
What is a valid Cisco AMP file disposition?
A.
non-malicious
B.
malware
C.
known-good
D.
pristine
malware
Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmcconfig-
guide- v60/Reference_a_wrapper_Chapter_topic_here.html
Page 13 out of 51 Pages |
Previous |