Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)
Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)A . dynamic key mapping objects that help link HTTP and HTTPS GET requests to Layer 7 application protocols.B . reputation-based objects that represent Security Intelligence feeds and lists, application filters based on category and reputation, and...
Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)
Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)A . BGPv6B . ECMP with up to three equal cost paths across multiple interfacesC . ECMP with up to three equal cost paths across a single interfaceD . BGPv4 in transparent firewall modeE . BGPv4 with nonstop...
What is the reason for this issue?
A network administrator notices that remote access VPN users are not reachable from inside the network. It is determined that routing is configured correctly, however return traffic is entering the firewall but not leaving it. What is the reason for this issue?A . A manual NAT exemption rule does not...
Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)
Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)A . The units must be the same versionB . Both devices can be part of a different group that must be in the same domain when configured within the FMD . The units...
Which two deployment types support high availability? (Choose two.)
Which two deployment types support high availability? (Choose two.)A . transparentB . routedC . clusteredD . intra-chassis multi-instanceE . virtual appliance in public cloudView AnswerAnswer: A,B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/firepower_threat_defense_high_availability.html
In which two places can thresholding settings be configured? (Choose two.)
In which two places can thresholding settings be configured? (Choose two.)A . on each IPS ruleB . globally, within the network analysis policyC . globally, per intrusion policyD . on each access control ruleE . per preprocessor, within the network analysis policyView AnswerAnswer: A,C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-Global-Threshold.pdf
How should this be addressed to block the traffic while allowing legitimate user traffic?
An organization is using a Cisco FTD and Cisco ISE to perform identity-based access controls. A network administrator is analyzing the Cisco FTD events and notices that unknown user traffic is being allowed through the firewall . How should this be addressed to block the traffic while allowing legitimate user...
What must be configured to meet these requirements?
An engineer is configuring Cisco FMC and wants to allow multiple physical interfaces to be part of the same VLAN. The managed devices must be able to perform Layer 2 switching between interfaces, including sub-interfaces . What must be configured to meet these requirements?A . interface-based VLAN switchingB . inter-chassis...
Which two steps must be taken to meet these requirements?
An organization does not want to use the default Cisco Firepower block page when blocking HTTP traffic. The organization wants to include information about its policies and procedures to help educate the users whenever a block occurs . Which two steps must be taken to meet these requirements? (Choose two.)A...
What is the maximum bit size that Cisco FMC supports for HTTPS certificates?
What is the maximum bit size that Cisco FMC supports for HTTPS certificates?A . 1024B . 8192C . 4096D . 2048View AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/system_configuration.html