Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)
Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)A . BGPv6 B. ECMP with up to three equal cost paths across multiple interfaces C. ECMP with up to three equal cost paths across a single interface D. BGPv4 in transparent firewall mode E. BGPv4 with nonstop...
Which action must be taken while replacing the faulty unit?
A network security engineer must replace a faulty Cisco FTD device in a high availability pair. Which action must be taken while replacing the faulty unit?A . Shut down the Cisco FMC before powering up the replacement unit. B. Ensure that the faulty Cisco FTD device remains registered to the...
What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?
What is the disadvantage of setting up a site-to-site VPN in a clustered-units environment?A . VPN connections can be re-established only if the failed master unit recovers. B. Smart License is required to maintain VPN connections simultaneously across all cluster units. C. VPN connections must be re-established when a new...
Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)
Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)A . dynamic key mapping objects that help link HTTP and HTTPS GET requests to Layer 7 application protocols. B. reputation-based objects that represent Security Intelligence feeds and lists, application filters based on category and reputation, and...
Which object type supports object overrides?
Which object type supports object overrides?A . time range B. security group tag C. network object D. DNS server groupView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Reusable_Objects.html#concept_8BFE8B9A83D742D9B647A74F7AD50053
What is a behavior of a Cisco FMC database purge?
What is a behavior of a Cisco FMC database purge?A . User login and history data are removed from the database if the User Activity check box is selected. B. Data can be recovered from the device. C. The appropriate process is restarted. D. The specified data is removed from...
Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC from the left into the correct order on the right. Not all options are used
DRAG DROP Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC from the left into the correct order on the right. Not all options are used. View AnswerAnswer: Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_management_center_high_availability.html#id_32288
Which Cisco Firepower rule action displays an HTTP warning page?
Which Cisco Firepower rule action displays an HTTP warning page?A . Monitor B. Block C. Interactive Block D. Allow with WarningView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/AC-Rules-Tuning-Overview.html#76698
How should this be addressed to block the traffic while allowing legitimate user traffic?
An organization is using a Cisco FTD and Cisco ISE to perform identity-based access controls. A network administrator is analyzing the Cisco FTD events and notices that unknown user traffic is being allowed through the firewall. How should this be addressed to block the traffic while allowing legitimate user traffic?A...
Which command is run at the CLI when logged in to an FTD unit, to determine whether the unit is managed locally or by a remote FMC server?
Which command is run at the CLI when logged in to an FTD unit, to determine whether the unit is managed locally or by a remote FMC server?A . system generate-troubleshoot B. show configuration session C. show managers D. show running-config | include managerView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/c_3.html