CCNP Security Cisco Firepower SNCF 300-710 Test Questions

The Securing Networks with Cisco Firepower v1.0 (SNCF 300-710) exam is a 90-minute exam associated with the CCNP Security, and Cisco Certified Specialist – Network Security Firepower certifications. This exam tests a candidate’s knowledge of Cisco Firepower® Threat Defense and Firepower®, including policy configurations, integrations, deployments, management and troubleshooting.

With the help of actual CCNP Security Cisco Firepower SNCF 300-710 Test Questions provided by our experts at PassQuestion, you can now pass the Securing Networks with Cisco Firepower exam without any hassle. You can easily pass CCNP Security 300-710 exam with the help of the CCNP Security Cisco Firepower SNCF 300-710 Test Questions provided by our experts. We are continuously working hard to create up to date 300-710 practice exam questions for passing Cisco CCNP Security Certification exam.

CCNP Security Cisco Firepower SNCF 300-710 Test Questions

1. What is a result of enabling Cisco FTD clustering?

 
 
 
 

2. Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)

 
 
 
 
 

3. On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?

 
 
 
 

4. What are the minimum requirements to deploy a managed device inline?

 
 
 
 

5. What is the difference between inline and inline tap on Cisco Firepower?

 
 
 
 

6. With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?

 
 
 
 

7. Which two deployment types support high availability? (Choose two.)

 
 
 
 
 

8. Which protocol establishes network redundancy in a switched Firepower device deployment?

 
 
 
 

9. Which interface type allows packets to be dropped?

 
 
 
 

10. Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)

 
 
 
 
 

11. Which two deployment types support high availability? (Choose two.)

 
 
 
 
 

12. Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)

 
 
 
 
 

13. Which policy rule is included in the deployment of a local DMZ during the initial deployment of a Cisco NGFW through the Cisco FMC GUI?

 
 
 
 

14. What is a result of enabling Cisco FTD clustering?

 
 
 
 

15. Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)

 
 
 
 
 

16. What is the difference between inline and inline tap on Cisco Firepower?

 
 
 
 

17. Which interface type allows packets to be dropped?

 
 
 
 

18. Which protocol establishes network redundancy in a switched Firepower device deployment?

 
 
 
 

19. On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?

 
 
 
 

20. Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)

 
 
 
 
 

21. With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?

 
 
 
 

22. What are the minimum requirements to deploy a managed device inline?

 
 
 
 

23. What are two application layer preprocessors? (Choose two.)

 
 
 
 
 

24. Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)

 
 
 
 
 

25. In which two places can thresholding settings be configured? (Choose two.)

 
 
 
 
 

26. Which two actions can be used in an access control policy rule? (Choose two.)

 
 
 
 
 

27. Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)

 
 
 
 
 

28. What is the result of specifying of QoS rule that has a rate limit that is greater than the maximum throughput of an interface?

 
 
 
 

29. In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

 
 
 
 
 

30. Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)

 
 
 
 
 

31. When creating a report template, how can the results be limited to show only the activity of a specific subnet?

 
 
 
 

32. Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?

 
 
 
 

33. Which Cisco Firepower rule action displays an HTTP warning page?

 
 
 
 

34. Which object type supports object overrides?

 
 
 
 

35. Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)

 
 
 
 
 

36. Which Firepower feature allows users to configure bridges in routed mode and enables devices to perform Layer 2 switching between interfaces?

 
 
 
 

37. What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?

 
 
 
 

38. Which command is run at the CLI when logged in to an FTD unit, to determine whether the unit is managed locally or by a remote FMC server?

 
 
 
 

39. Which group within Cisco does the Threat Response team use for threat analysis and research?

 
 
 
 

40. What is the maximum bit size that Cisco FMC supports for HTTPS certificates?

 
 
 
 

41. What is a behavior of a Cisco FMC database purge?

 
 
 
 

42. What is a functionality of port objects in Cisco FMC?

 
 
 
 

43. Which command must be run to generate troubleshooting files on an FTD?

 
 
 
 

44. Which report template field format is available in Cisco FMC?

 
 
 
 

45. Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?

 
 
 
 

46. Within Cisco Firepower Management Center, where does a user add or modify widgets?

 
 
 
 

47. How many report templates does the Cisco Firepower Management Center support?

 
 
 
 

48. Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)

 
 
 
 
 

49. What is the benefit of selecting the trace option for packet capture?

 
 
 
 

50. A network engineer is configuring URL Filtering on Firepower Threat Defense.

Which two port requirements on the Firepower Management Center must be validated to allow communication with the cloud service? (Choose two.)

 
 
 
 
 

51. Which command-line mode is supported from the Cisco Firepower Management Center CLI?

 
 
 
 

52. Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?

 
 
 
 

53. Which CLI command is used to control special handling of ClientHello messages?

 
 
 
 

54. Which command should be used on the Cisco FTD CLI to capture all the packets that hit an interface?

 
 
 
 

55. Which Cisco Firepower feature is used to reduce the number of events received in a period of time?

 
 
 
 

56. DRAG DROP

Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC from the left into the correct order on the right. Not all options are used.

57. Which action should be taken after editing an object that is used inside an access control policy?

 
 
 
 

58. Which two packet captures does the FTD LINA engine support? (Choose two.)

 
 
 
 
 

59. Which CLI command is used to generate firewall debug messages on a Cisco Firepower?

 
 
 
 

60. After deploying a network-monitoring tool to manage and monitor networking devices in your organization, you realize that you need to manually upload an MIB for the Cisco FMC. In which folder should you upload the MIB file?

 
 
 
 
 
 
 
 

61. Which CLI command is used to control special handling of Client Hello messages?

 
 
 
 

62. A network engineer is extending a user segment through an FTD device for traffic inspection without creating another IP subnet.

How is this accomplished on an FTD device in routed mode?

 
 
 
 

63. An engineer is implementing Cisco FTD in the network and is determining which Firepower mode to use the organization needs to have multiple virtual Firepower devices working separately inside the FTD application to provide traffic segmentation.

Which deployment mode should be configured in the Cisco Firepower Management Console to support these requirements?

 
 
 
 

64. An engineer is troubleshooting application failures through a FTD deployment While using the FMC CLI, it has been determined that the traffic in question is not matching the desired policy.

What should be done to correct this?

 
 
 
 

65. What is the benefit of selecting the trace option for packet capture?

 
 
 
 

66. An engineer is setting up a new Firepower deployment and is looking at the default FMC policies to start the implementation. During the initial trial phase, the organization wants to test some common Snort rules while still allowing the majority of network traffic to pass.

Which default policy should be used?

 
 
 
 

67. Which two types of objects are reusable and supported by Cisco FMC? (Choose two)

 
 
 
 
 

68. An engineer currently has a Cisco FTD device registered to the Cisco FMC and is assigned the address of 10.10.50.12. The organization is upgrading the addressing schemes and there is a requirement to convert the addresses to a format that provides an adequate amount of addresses on the network.

What should the engineer do to ensure that the new addressing takes effect and can be used for the Cisco FTD to Cisco FMC connection?

 
 
 
 

69. An engineer is configuring a Cisco FTD appliance in IPS-only mode and needs to utilize fail-to-wire interfaces.

Which interface mode should be used to meet these requirements?

 
 
 
 

70. An organization has noticed that malware was downloaded from a website that does not currently have a known bad reputation.

How will this issue be addressed globally in the quickest way possible and with the least amount of impact?

 
 
 
 

71. Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)

 
 
 
 
 

72. An engineer is troubleshooting a device that cannot connect to a web server. The connection is initiated from the Cisco FTD inside interface and attempting to reach 10.0. 1.100 over the non-standard port of 9443. The host the engineer is attempting the connection from is at the IP address of 10.20.10.20.

in order to determine what is happening to the packets on the network, the engineer decides to use the FTD packet capture tool.

Which capture configuration should be used to gather the information needed to troubleshoot this issue?

A)

B)

C)

D)

 
 
 
 

73. Refer to the exhibit.

An organization has an access control rule with the intention of sending all social media traffic for inspection. After using the rule for some time, the administrator notices that the traffic is not being inspected, but is being automatically allowed.

What must be done to address this issue?

 
 
 

74. An engineer is attempting to create a new dashboard within the Cisco FMC to have a single view with widgets from many of the other dashboards. The goal is to have a mixture of threat and security related widgets along with Cisco Firepower device health information.

Which two widgets must be configured to provide this information? (Choose two.)

 
 
 
 
 

75. Refer to the exhibit.

An administrator is looking at some of the reporting capabilities for Cisco Firepower and noticed this section of the Network Risk Report showing a lot of SSL activity that could be used for evasion.

Which action will mitigate this risk?

 
 
 
 

76. A network administrator is seeing an unknown verdict for a file detected by Cisco FTD.

Which malware policy configuration option must be selected in order to further analyze the file in the Talos cloud?

 
 
 
 

77. With Cisco FTD software, which interface mode must be configured to passively receive traffic that passes through the appliance?

 
 
 
 

78. An organization has seen a lot of traffic congestion on their links going out to the interanet. There is a Cisco Firepower device that processes all of the traffic going to the internet prior to leaving the enterprise.

How is the congestion alleviated? so that legitimate business traffic reaches the destination?

 
 
 
 

79. Network traffic coming from an organization’s CEO must never be denied

Which access control policy configuration option should be used if the deployment engineer is not permitted to create a rule to allow all traffic?

 
 
 
 

80. An engineer configures a network discovery policy on Cisco FMC. Upon configuration, it is noticed that excessive and misleading events are filing the database and overloading the Cisco FMC. A monitored NAT device is executing multiple updates of ts operating system in a short period of time.

What configuration change must be made to alleviate this issue?

 
 
 
 

81. Which two deployment types support high availability? (Choose two.)

 
 
 
 
 

82. What are two application layer preprocessors? (Choose two.)

 
 
 
 
 

83. Which policy rule is included in the deployment of a local DMZ during the initial deployment of a Cisco NGFW through the Cisco FMC GUI?

 
 
 
 

84. Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)

 
 
 
 
 

85. What are the minimum requirements to deploy a managed device inline?

 
 
 
 

86. What is a result of enabling Cisco FTD clustering?

 
 
 
 

87. Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)

 
 
 
 
 

88. Which protocol establishes network redundancy in a switched Firepower device deployment?

 
 
 
 

89. With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?

 
 
 
 

90. On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?

 
 
 
 

91. Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)

 
 
 
 
 

92. Which interface type allows packets to be dropped?

 
 
 
 

93. What is the difference between inline and inline tap on Cisco Firepower?

 
 
 
 

94. Which Firepower feature allows users to configure bridges in routed mode and enables devices to perform Layer 2 switching between interfaces?

 
 
 
 

95. Which object type supports object overrides?

 
 
 
 

96. Which two actions can be used in an access control policy rule? (Choose two.)

 
 
 
 
 

97. Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)

 
 
 
 
 

98. What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?

 
 
 
 

99. Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)

 
 
 
 
 

100. Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)

 
 
 
 
 

101. When creating a report template, how can the results be limited to show only the activity of a specific subnet?

 
 
 
 

102. Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)

 
 
 
 
 

103. Which Cisco Firepower rule action displays an HTTP warning page?

 
 
 
 

104. What is the result of specifying of QoS rule that has a rate limit that is greater than the maximum throughput of an interface?

 
 
 
 

105. In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

 
 
 
 
 

106. In which two places can thresholding settings be configured? (Choose two.)

 
 
 
 
 

107. Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?

 
 
 
 

108. Which Cisco Firepower feature is used to reduce the number of events received in a period of time?

 
 
 
 

109. Which command must be run to generate troubleshooting files on an FTD?

 
 
 
 

110. What is the maximum bit size that Cisco FMC supports for HTTPS certificates?

 
 
 
 

Cisco CCNP Collaboration 300-820 CLCEI Exam Questions
CCNP Security 300-720 SESA Exam Questions - Securing Email with Cisco Email Security Appliance

Leave a Reply

Your email address will not be published. Required fields are marked *