What must be configured to meet these requirements?
Within an organization's high availability environment where both firewalls are passing traffic, traffic must be segmented based on which department it is destined for. Each department is situated on a different LAN. What must be configured to meet these requirements?A . span EtherChannel clustering B. redundant interfaces C. high availability...
What is the maximum bit size that Cisco FMC supports for HTTPS certificates?
What is the maximum bit size that Cisco FMC supports for HTTPS certificates?A . 1024 B. 8192 C. 4096 D. 2048View AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/system_configuration.html
On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?
On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?A . transparent inline mode B. TAP mode C. strict TCP enforcement D. propagate link stateView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/inline_sets_and_passive_interfaces_for_firepower_threat_defense.html
When do you need the file-size command option during troubleshooting with packet capture?
When do you need the file-size command option during troubleshooting with packet capture?A . when capture packets are less than 16 MB B. when capture packets are restricted from the secondary memory C. when capture packets exceed 10 GB D. when capture packets exceed 32 MBView AnswerAnswer: D Explanation: Reference:...
Which command must be run to generate troubleshooting files on an FTD?
Which command must be run to generate troubleshooting files on an FTD?A . system support view-files B. sudo sf_troubleshoot.pl C. system generate-troubleshoot all D. show tech-supportView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/sourcefire-defense-center/117663-technote-SourceFire-00.html
Which action accomplishes this task?
A company is in the process of deploying intrusion prevention with Cisco FTDs managed by a Cisco FMC. An engineer must configure policies to detect potential intrusions but not block the suspicious traffic. Which action accomplishes this task?A . Configure IDS mode when creating or editing a policy rule under...
Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC from the left into the correct order on the right. Not all options are used
DRAG DROP Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC from the left into the correct order on the right. Not all options are used. View AnswerAnswer:
What is the reason for this failure?
An administrator is creating interface objects to better segment their network but is having trouble adding interfaces to the objects. What is the reason for this failure?A . The interfaces are being used for NAT for multiple networks. B. The administrator is adding interfaces of multiple types. C. The administrator...
Which action must be taken to meet these requirements?
An engineer is building a new access control policy using Cisco FMC. The policy must inspect a unique IPS policy as well as log rule matching. Which action must be taken to meet these requirements?A . Configure an IPS policy and enable per-rule logging. B. Disable the default IPS policy...
What is the cause of this issue?
A network administrator reviews the file report for the last month and notices that all file types, except exe. show a disposition of unknown. What is the cause of this issue?A . The malware license has not been applied to the Cisco FTD. B. The Cisco FMC cannot reach the...