Which Cisco Firepower feature is used to reduce the number of events received in a period of time?

Which Cisco Firepower feature is used to reduce the number of events received in a period of time?A . rate-limiting B. suspending C. correlation D. thresholdingView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-Global-Threshold.html

February 17, 2023 No Comments READ MORE +

Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)

Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)A . application blocking B. simple custom detection C. file repository D. exclusions E. application whitelistingView AnswerAnswer: A,B

February 17, 2023 No Comments READ MORE +

A network engineer implements a new Cisco Firepower device on the network to take advantage of its intrusion detection functionality. There is a requirement to analyze the traffic going across the device, alert on any malicious traffic, and appear as a bump in the wire How should this be implemented?

A network engineer implements a new Cisco Firepower device on the network to take advantage of its intrusion detection functionality. There is a requirement to analyze the traffic going across the device, alert on any malicious traffic, and appear as a bump in the wire How should this be implemented?A...

February 17, 2023 No Comments READ MORE +

Which interface type allows packets to be dropped?

Which interface type allows packets to be dropped?A . passive B. inline C. ERSPAN D. TAPView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200908-configuring-firepower-threat-defense-int.html

February 17, 2023 No Comments READ MORE +

What configuration change must be made to alleviate this issue?

An engineer configures a network discovery policy on Cisco FMC. Upon configuration, it is noticed that excessive and misleading events filing the database and overloading the Cisco FMC. A monitored NAT device is executing multiple updates of its operating system in a short period of time. What configuration change must...

February 17, 2023 No Comments READ MORE +

How is this requirement satisfied?

An engineer is tasked with deploying an internal perimeter firewall that will support multiple DMZs Each DMZ has a unique private IP subnet range. How is this requirement satisfied?A . Deploy the firewall in transparent mode with access control policies. B. Deploy the firewall in routed mode with access control...

February 16, 2023 No Comments READ MORE +

Which command-line mode is supported from the Cisco Firepower Management Center CLI?

Which command-line mode is supported from the Cisco Firepower Management Center CLI?A . privileged B. user C. configuration D. adminView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/command_line_reference.pdf

February 16, 2023 No Comments READ MORE +

Which object type supports object overrides?

Which object type supports object overrides?A . time range B. security group tag C. network object D. DNS server groupView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Reusable_Objects.html#concept_8BFE8B9A83D742D9B647A74F7AD50053

February 16, 2023 No Comments READ MORE +

What is a functionality of port objects in Cisco FMC?

What is a functionality of port objects in Cisco FMC?A . to mix transport protocols when setting both source and destination port conditions in a rule B. to represent protocols other than TCP, UDP, and ICMP C. to represent all protocols in the same way D. to add any protocol...

February 16, 2023 No Comments READ MORE +

How must the devices be implemented in this environment?

An engineer must configure high availability for the Cisco Firepower devices. The current network topology does not allow for two devices to pass traffic concurrently. How must the devices be implemented in this environment?A . in active/active mode B. in a cluster span EtherChannel C. in active/passive mode D. in...

February 16, 2023 No Comments READ MORE +