Which action accomplishes this task?

A company is in the process of deploying intrusion prevention with Cisco FTDs managed by a Cisco FMC. An engineer must configure policies to detect potential intrusions but not block the suspicious traffic. Which action accomplishes this task?A . Configure IDS mode when creating or editing a policy rule under...

December 30, 2022 No Comments READ MORE +

Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?

Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?A . Windows domain controller B. audit C. triage D. protectionView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/214933-amp-for-endpoints-deployment-methodology.html

December 30, 2022 No Comments READ MORE +

Which two steps must be taken to meet these requirements?

An organization does not want to use the default Cisco Firepower block page when blocking HTTP traffic. The organization wants to include information about its policies and procedures to help educate the users whenever a block occurs. Which two steps must be taken to meet these requirements? (Choose two.)A ....

December 30, 2022 No Comments READ MORE +

What is the maximum bit size that Cisco FMC supports for HTTPS certificates?

What is the maximum bit size that Cisco FMC supports for HTTPS certificates?A . 1024 B. 8192 C. 4096 D. 2048View AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/system_configuration.html

December 30, 2022 No Comments READ MORE +

Which two conditions must be met to enable high availability between two Cisco FTD devices? (Choose two.)

Which two conditions must be met to enable high availability between two Cisco FTD devices? (Choose two.)A . same flash memory size B. same NTP configuration C. same DHCP/PPoE configuration D. same host name E. same number of interfacesView AnswerAnswer: BE Explanation: https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212699-configure-ftd-high-availability-on-firep.html Conditions In order to create an HA...

December 29, 2022 No Comments READ MORE +

Which firewall mode is the Cisco FTD set up to support?

A Cisco FTD has two physical interfaces assigned to a BVI. Each interface is connected to a different VLAN on the same switch. Which firewall mode is the Cisco FTD set up to support?A . active/active failover B. transparent C. routed D. high availability clusteringView AnswerAnswer: B

December 29, 2022 No Comments READ MORE +

What is the cause of this issue?

A network administrator reviews the file report for the last month and notices that all file types, except exe. show a disposition of unknown. What is the cause of this issue?A . The malware license has not been applied to the Cisco FTD. B. The Cisco FMC cannot reach the...

December 28, 2022 No Comments READ MORE +

What must be configured to meet these requirements?

Within an organization's high availability environment where both firewalls are passing traffic, traffic must be segmented based on which department it is destined for. Each department is situated on a different LAN. What must be configured to meet these requirements?A . span EtherChannel clustering B. redundant interfaces C. high availability...

December 28, 2022 No Comments READ MORE +

Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)

Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)A . OSPFv2 with IPv6 capabilities B. virtual links C. SHA authentication to OSPF packets D. area boundary router type 1 LSA filtering E. MD5 authentication to OSPF packetsView AnswerAnswer: BE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/ospf_for_firepower_threat_defense.html

December 28, 2022 No Comments READ MORE +

When do you need the file-size command option during troubleshooting with packet capture?

When do you need the file-size command option during troubleshooting with packet capture?A . when capture packets are less than 16 MB B. when capture packets are restricted from the secondary memory C. when capture packets exceed 10 GB D. when capture packets exceed 32 MBView AnswerAnswer: D Explanation: Reference:...

December 27, 2022 No Comments READ MORE +