What are the minimum requirements to deploy a managed device inline?
What are the minimum requirements to deploy a managed device inline?A . inline interfaces, security zones, MTU, and mode B. passive interface, MTU, and mode C. inline interfaces, MTU, and mode D. passive interface, security zone, MTU, and modeView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/ips_device_deployments_and_configuration.html
Which CLI command is used to control special handling of ClientHello messages?
Which CLI command is used to control special handling of ClientHello messages?A . system support ssl-client-hello-tuning B. system support ssl-client-hello-display C. system support ssl-client-hello-force-reset D. system support ssl-client-hello-enabledView AnswerAnswer: A
What is a behavior of a Cisco FMC database purge?
What is a behavior of a Cisco FMC database purge?A . User login and history data are removed from the database if the User Activity check box is selected. B. Data can be recovered from the device. C. The appropriate process is restarted. D. The specified data is removed from...
With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?
With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?A . inline set B. passive C. routed D. inline tapView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/interface_overview_for_firepower_threat_defense.html
Which two actions can be used in an access control policy rule? (Choose two.)
Which two actions can be used in an access control policy rule? (Choose two.)A . Block with Reset B. Monitor C. Analyze D. Discover E. Block ALLView AnswerAnswer: A,B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/AC-Rules-Tuning-Overview.html#71854
Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)
Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)A . The units must be the same version B. Both devices can be part of a different group that must be in the same domain when configured within the FMC. C. The units...
Which firewall design allows a firewall to forward traffic at layer 2 and layer 3 for the same subnet?
Which firewall design allows a firewall to forward traffic at layer 2 and layer 3 for the same subnet?A . Cisco Firepower Threat Defense mode B. transparent mode C. routed mode D. integrated routing and bridgingView AnswerAnswer: B
Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?
Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?A . configure high-availability resume B. configure high-availability disable C. system support network-options D. configure high-availability suspendView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/firepower_threat_defense_high_availability.html
What are two application layer preprocessors? (Choose two.)
What are two application layer preprocessors? (Choose two.)A . CIFS B. IMAP C. SSL D. DNP3 E. ICMPView AnswerAnswer: B,C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Application_Layer_Preprocessors.html
Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?
Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?A . Child domains can view but not edit dashboards that originate from an ancestor domain. B. Child domains have access to only a limited set of widgets from ancestor domains. C. Only the administrator of the top...