Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)
Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)A . OSPFv2 with IPv6 capabilitiesB . virtual linksC . SHA authentication to OSPF packetsD . area boundary router type 1 LSA filteringE . MD5 authentication to OSPF packetsView AnswerAnswer: BE Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/ospf_for_firepower_threat_defense.html
In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot be reached?
In a Cisco AMP for Networks deployment, which disposition is returned if the cloud cannot be reached?A . unavailableB . unknownC . cleanD . disconnectedView AnswerAnswer: A
What mechanism should be used to accomplish this task?
An engineer has been asked to show application usages automatically on a monthly basis and send the information to management. What mechanism should be used to accomplish this task?A . event viewerB . reportsC . dashboardsD . context explorerView AnswerAnswer: B
Which Cisco Firepower feature is used to reduce the number of events received in a period of time?
Which Cisco Firepower feature is used to reduce the number of events received in a period of time?A . rate-limitingB . suspendingC . correlationD . thresholdingView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-Global-Threshold.html
What are the minimum requirements to deploy a managed device inline?
What are the minimum requirements to deploy a managed device inline?A . inline interfaces, security zones, MTU, and modeB . passive interface, MTU, and modeC . inline interfaces, MTU, and modeD . passive interface, security zone, MTU, and modeView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/ips_device_deployments_and_configuration.html
Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?
Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?A . configure high-availability resumeB . configure high-availability disableC . system support network-optionsD . configure high-availability suspendView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/firepower_threat_defense_high_availability.html
With Cisco FTD integrated routing and bridging, which interface does the bridge group use to communicate with a routed interface?
With Cisco FTD integrated routing and bridging, which interface does the bridge group use to communicate with a routed interface?A . switch virtualB . bridge group memberC . bridge virtualD . subinterfaceView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html
Which default policy should be used?
An engineer is setting up a new Firepower deployment and is looking at the default FMC policies to start the implementation During the initial trial phase, the organization wants to test some common Snort rules while still allowing the majority of network traffic to pass. Which default policy should be...
Which interface type allows packets to be dropped?
Which interface type allows packets to be dropped?A . passiveB . inlineC . ERSPAND . TAPView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200908-configuring-firepower-threat-defense-int.html
What is the maximum SHA level of filtering that Threat Intelligence Director supports?
What is the maximum SHA level of filtering that Threat Intelligence Director supports?A . SHA-1024B . SHA-4096C . SHA-512D . SHA-256View AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/cisco_threat_intelligence_directortid_.html