When creating a report template, how can the results be limited to show only the activity of a specific subnet?

When creating a report template, how can the results be limited to show only the activity of a specific subnet?A . Create acustom search in Firepower Management Center and select it in each section of the report.B . Add an Input Parameter in the Advanced Settings of the report, and...

March 12, 2022 No Comments READ MORE +

What is a behavior of a Cisco FMC database purge?

What is a behavior of a Cisco FMC database purge?A . User login and history data are removed from the database if the User Activity check box is selected.B . Data can be recovered from the device.C . The appropriate process is restarted.D . The specified data is removed from...

March 12, 2022 No Comments READ MORE +

What must be done to resolve this issue?

An organization has a Cisco FTD that uses bridge groups to pass traffic from the inside interfaces to the outside interfaces. They are unable to gather information about neighbouring Cisco devices or use multicast in their environment. What must be done to resolve this issue?A . Create a firewall rule...

March 12, 2022 No Comments READ MORE +

Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)

Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)A . EIGRPB . OSPFC . static routingD . IS-ISE . BGPView AnswerAnswer: B,E Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/fdm/fptd-fdm-config-guide-660/fptd-fdm-routing.html

March 12, 2022 No Comments READ MORE +

What must be configured to meet these requirements?

Within an organization's high availability environment where both firewalls are passing traffic, traffic must be segmented based on which department it is destined for. Each department is situated on a different LAN. What must be configured to meet these requirements?A . span EtherChannel clusteringB . redundant interfacesC . high availability...

March 11, 2022 No Comments READ MORE +

Which protocol establishes network redundancy in a switched Firepower device deployment?

Which protocol establishes network redundancy in a switched Firepower device deployment?A . STPB . HSRPC . GLBPD . VRRPView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_threat_defense_high_availability.html

March 11, 2022 No Comments READ MORE +

Which command must be run to generate troubleshooting files on an FTD?

Which command must be run to generate troubleshooting files on an FTD?A . system support view-filesB . sudosf_troubleshoot.plC . system generate-troubleshoot allD . show tech-supportView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/sourcefire-defense-center/117663-technote-SourceFire-00.html

March 11, 2022 No Comments READ MORE +

Which command is entered in the Cisco FMC CLI to generate a troubleshooting file?

Which command is entered in the Cisco FMC CLI to generate a troubleshooting file?A . show running-configB . show tech-support chassisC . system support diagnostic-cliD . sudo sf_troubleshoot.plView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/sourcefire-defense-center/117663-technote-SourceFire-00.html

March 10, 2022 No Comments READ MORE +

In which two places can thresholding settings be configured? (Choose two.)

In which two places can thresholding settings be configured? (Choose two.)A . on each IPS ruleB . globally, within the network analysis policyC . globally, perintrusion policyD . on each access control ruleE . per preprocessor, within the network analysis policyView AnswerAnswer: A,C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-Global-Threshold.pdf

March 10, 2022 No Comments READ MORE +

With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?

With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?A . inline setB . passiveC . routedD . inline tapView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/interface_overview_for_firepower_threat_defense.html

March 10, 2022 No Comments READ MORE +