Go Back on 300-710 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

300-710 Practice Test


Page 15 out of 51 Pages

Topic 4: Integration

Which action should you take when Cisco Threat Response notifies you that AMP has
identified a file as malware?


A.

Add the malicious file to the block list


B.

Send a snapshot to Cisco for technical support


C.

Forward the result of the investigation to an external threat-analysis engine


D.

Wait for Cisco Threat Response to automatically block the malware





A.
  

Add the malicious file to the block list



Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat
Containment?


A.

pxGrid


B.

FTD RTC


C.

FMC RTC


D.

ISEGrid





A.
  

pxGrid



What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?


A.

VPN connections can be re-established only if the failed master unit recovers.



B.

Smart License is required to maintain VPN connections simultaneously across all cluster units.


C.

VPN connections must be re-established when a new master unit is elected.


D.

Only established VPN connections are maintained when a new master unit is elected. 





C.
  

VPN connections must be re-established when a new master unit is elected.



Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/clustering/ftdcluster- solution.html#concept_g32_yml_y2b 

Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring
endpoint actively?


A.

Windows domain controller


B.

audit


C.

triage


D.

protection





B.
  

audit



In which two ways do access control policies operate on a Cisco Firepower system?
(Choose two.)


A.

Traffic inspection can be interrupted temporarily when configuration changes are
deployed.



 


B.

The system performs intrusion inspection followed by file inspection.


C.

They can block traffic based on Security Intelligence data.


D.

File policies use an associated variable set to perform intrusion prevention.


E.

The system performs a preliminary inspection on trusted traffic to validate that it
matches the trusted parameters.





A.
  

Traffic inspection can be interrupted temporarily when configuration changes are
deployed.



 



C.
  

They can block traffic based on Security Intelligence data.



Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmcconfig-guide-v60/Access_Control_Using_Intrusion_and_File_Policies.html 


Page 15 out of 51 Pages
Previous