On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?

On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?A . transparent inline mode B. TAP mode C. strict TCP enforcement D. propagate link stateView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/inline_sets_and_passive_interfaces_for_firepower_threat_defense.html

October 13, 2022 No Comments READ MORE +

Which Cisco Firepower feature is used to reduce the number of events received in a period of time?

Which Cisco Firepower feature is used to reduce the number of events received in a period of time?A . rate-limiting B. suspending C. correlation D. thresholdingView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-Global-Threshold.html

October 13, 2022 No Comments READ MORE +

Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)

Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)A . EIGRP B. OSPF C. static routing D. IS-IS E. BGPView AnswerAnswer: BE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/fdm/fptd-fdm-config-guide-660/fptd-fdm-routing.html

October 12, 2022 No Comments READ MORE +

There is a requirement to analyze the traffic going across the device, alert on any malicious traffic, and appear as a bump in the wire How should this be implemented?

A network engineer implements a new Cisco Firepower device on the network to take advantage of its intrusion detection functionality. There is a requirement to analyze the traffic going across the device, alert on any malicious traffic, and appear as a bump in the wire How should this be implemented?A...

October 12, 2022 No Comments READ MORE +

Which configuration addresses this concern?

A company has many Cisco FTD devices managed by a Cisco FMC. The security model requires that access control rule logs be collected for analysis. The security engineer is concerned that the Cisco FMC will not be able to process the volume of logging that will be generated. Which configuration...

October 12, 2022 No Comments READ MORE +

Which protocol establishes network redundancy in a switched Firepower device deployment?

Which protocol establishes network redundancy in a switched Firepower device deployment?A . STP B. HSRP C. GLBP D. VRRPView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_threat_defense_high_availability.html

October 12, 2022 No Comments READ MORE +

Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)

Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)A . OSPFv2 with IPv6 capabilities B. virtual links C. SHA authentication to OSPF packets D. area boundary router type 1 LSA filtering E. MD5 authentication to OSPF packetsView AnswerAnswer: BE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/ospf_for_firepower_threat_defense.html

October 12, 2022 No Comments READ MORE +

Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)

Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)A . An option to re-apply NAT and VPN policies during registration is available, so users do not need to re-apply the policies after registration is completed. B. Before re-adding the device in Cisco FMC,...

October 11, 2022 No Comments READ MORE +

In which folder should you upload the MIB file?

After deploying a network-monitoring tool to manage and monitor networking devices in your organization, you realize that you need to manually upload an MIB for the Cisco FMC. In which folder should you upload the MIB file?A . /etc/sf/DCMIB.ALERT B. /sf/etc/DCEALERT.MIB C. /etc/sf/DCEALERT.MIB D. system/etc/DCEALERT.MIBView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-External-Responses.pdf

October 11, 2022 No Comments READ MORE +

What is the reason for this issue?

A network administrator notices that remote access VPN users are not reachable from inside the network. It is determined that routing is configured correctly, however return traffic is entering the firewall but not leaving it. What is the reason for this issue?A . A manual NAT exemption rule does not...

October 11, 2022 No Comments READ MORE +