Which configuration addresses this concern?
A company has many Cisco FTD devices managed by a Cisco FMC. The security model requires that access control rule logs be collected for analysis. The security engineer is concerned that the Cisco FMC will not be able to process the volume of logging that will be generated. Which configuration...
Which command must be run to generate troubleshooting files on an FTD?
Which command must be run to generate troubleshooting files on an FTD?A . system support view-files B. sudo sf_troubleshoot.pl C. system generate-troubleshoot all D. show tech-supportView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/sourcefire-defense-center/117663-technote-SourceFire-00.html
What is a valid Cisco AMP file disposition?
What is a valid Cisco AMP file disposition?A . non-malicious B. malware C. known-good D. pristineView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Reference_a_wrapper_Chapter_topic_here.html
Which firewall design allows a firewall to forward traffic at layer 2 and layer 3 for the same subnet?
Which firewall design allows a firewall to forward traffic at layer 2 and layer 3 for the same subnet?A . Cisco Firepower Threat Defense mode B. transparent mode C. routed mode D. integrated routing and bridgingView AnswerAnswer: A Topic 2, Configuration
Which action should be taken after editing an object that is used inside an access control policy?
Which action should be taken after editing an object that is used inside an access control policy?A . Delete the existing object in use. B. Refresh the Cisco FMC GUI for the access control policy. C. Redeploy the updated configuration. D. Create another rule using a different object name.View AnswerAnswer:...
What is the difference between inline and inline tap on Cisco Firepower?
What is the difference between inline and inline tap on Cisco Firepower?A . Inline tap mode can send a copy of the traffic to another device. B. Inline tap mode does full packet capture. C. Inline mode cannot do SSL decryption. D. Inline mode can drop malicious traffic.View AnswerAnswer: D
Within Cisco Firepower Management Center, where does a user add or modify widgets?
Within Cisco Firepower Management Center, where does a user add or modify widgets?A . dashboard B. reporting C. context explorer D. summary toolView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Using_Dashboards.html
Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?
Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?A . Child domains can view but not edit dashboards that originate from an ancestor domain. B. Child domains have access to only a limited set of widgets from ancestor domains. C. Only the administrator of the top...
Why Is this occurring?
An engineer is using the configure manager add <FMC IP> Cisc402098527 command to add a new Cisco FTD device to the Cisco FMC; however, the device is not being added. Why Is this occurring?A . The NAT ID is required since the Cisco FMC is behind a NAT device. B....
Which two port requirements on the Firepower Management Center must be validated to allow communication with the cloud service?
A network engineer is configuring URL Filtering on Firepower Threat Defense. Which two port requirements on the Firepower Management Center must be validated to allow communication with the cloud service? (Choose two.)A . outbound port TCP/443 B. inbound port TCP/80 C. outbound port TCP/8080 D. inbound port TCP/443 E. outbound...