300-710 Exam Questions

Total 254 Questions

Last Updated Exam : 16-Dec-2024

Topic 3: Management and Troubleshooting

Within Cisco Firepower Management Center, where does a user add or modify widgets?


A.

dashboard


B.

reporting


C.

context explorer


D.

summary tool





A.
  

dashboard



In which two places can thresholding settings be configured? (Choose two.)


A.

on each IPS rule



 


B.

globally, within the network analysis policy


C.

globally, per intrusion policy


D.

on each access control rule


E.

per preprocessor, within the network analysis policy





A.
  

on each IPS rule



 



C.
  

globally, per intrusion policy



Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-moduleuser-guide/asa- firepower-module-user-guide-v541/Intrusion-Global-Threshold.pdf

When do you need the file-size command option during troubleshooting with packet
capture?


A.

when capture packets are less than 16 MB


B.

when capture packets are restricted from the secondary memory


C.

when capture packets exceed 10 GB


D.

when capture packets exceed 32 MB





D.
  

when capture packets exceed 32 MB



Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmcconfig-
guide-v62/troubleshooting_the_system.html

What is the benefit of selecting the trace option for packet capture?


A.

The option indicates whether the packet was dropped or successful


B.

The option indicated whether the destination host responds through a different path.


C.

The option limits the number of packets that are captured


D.

The option captures details of each packet





A.
  

The option indicates whether the packet was dropped or successful



When creating a report template, how can the results be limited to show only the activity of
a specific subnet? 


A.

Create a custom search in Firepower Management Center and select it in each sectionof the report.


B.

Add an Input Parameter in the Advanced Settings of the report, and set the type to Network/IP.


C.

Add a Table View section to the report with the Search field defined as the network in CIDR format.


D.

Select IP Address as the X-Axis in each section of the report. 





B.
  

Add an Input Parameter in the Advanced Settings of the report, and set the type to Network/IP.



Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/userguide/FireSIGHT-System- UserGuide-v5401/Reports.html#87267

Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop
running high- availability?


A.

configure high-availability resume


B.

configure high-availability disable


C.

system support network-options


D.

configure high-availability suspend





B.
  

configure high-availability disable



Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmcconfig-guide-v61/firepower_threat_defense_high_availability.html

What is a behavior of a Cisco FMC database purge?


A.

User login and history data are removed from the database if the User Activity check
box is selected.


B.

Data can be recovered from the device


C.

The appropriate process is restarted.


D.

The specified data is removed from Cisco FMC and kept for two weeks





C.
  

The appropriate process is restarted.



Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmcconfig-guide-v62/management_center_database_purge.pdf

Which limitation applies to Cisco Firepower Management Center dashboards in a
multidomain environment?


A.

Child domains can view but not edit dashboards that originate from an ancestor domain.


B.

Child domains have access to only a limited set of widgets from ancestor domains.


C.

Only the administrator of the top ancestor domain can view dashboards


D.

Child domains cannot view dashboards that originate from an ancestor domain





D.
  

Child domains cannot view dashboards that originate from an ancestor domain



Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.) 


A.

OSPFv2 with IPv6 capabilities



 


B.

virtual links


C.

SHA authentication to OSPF packets


D.

area boundary router type 1 LSA filtering


E.

MD5 authentication to OSPF packets





B.
  

virtual links



E.
  

MD5 authentication to OSPF packets



Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmcconfig- guide-v62/ospf_for_firepower_threat_defense.html 

What is the maximum bit size that Cisco FMC supports for HTTPS certificates?


A.

1024


B.

8192


C.

4096


D.

2048





C.
  

4096



Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmcconfig-guide-v61/system_configuration.html


Page 6 out of 26 Pages
Previous