Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)
Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)A . BGPv6B . ECMP with up to three equal cost paths across multiple interfacesC . ECMP with up to three equal cost paths across a single interfaceD . BGPv4 in transparent firewall modeE . BGPv4 with nonstop...
Which command should be used on the Cisco FTD CLIto capture all the packets that hit an interface?
Which command should be used on the Cisco FTD CLIto capture all the packets that hit an interface?A . configure coredump packet-engine enableB . capture-trafficC . captureD . capture WORDView AnswerAnswer: C Explanation: Reason: the command "capture-traffic" is used for SNORT Engine Captures. To capture a LINA Engine Capture, you...
Which two deployment types support high availability? (Choose two.)
Which two deployment types support high availability? (Choose two.)A . transparentB . routedC . clusteredD . intra-chassis multi-instanceE . virtualappliance in public cloudView AnswerAnswer: A,B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/firepower_threat_defense_high_availability.html
Within Cisco Firepower Management Center, where does a user add or modify widgets?
Within Cisco Firepower Management Center, where does a user add or modify widgets?A . dashboardB . reportingC . context explorerD . summary toolView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Using_Dashboards.html
Which Cisco Firepower feature is used to reduce the number of events received in a period of time?
Which Cisco Firepower feature is used to reduce the number of events received in a period of time?A . rate-limitingB . suspendingC . correlationD . thresholdingView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-Global-Threshold.html
What is the cause of this issue?
A network administrator reviews the file report for the last month and notices that all file types, except exe. show a disposition of unknown. What is the cause of this issue?A . The malware license has not been applied to the Cisco FTC . The Cisco FMC cannot reach the...
Which object type supports object overrides?
Which object type supports object overrides?A . time rangeB . security group tagC . network objectD . DNS server groupView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Reusable_Objects.html#concept_8BFE8B9A83D742D9B647A74F7AD50053
Which command-line mode is supported from the Cisco Firepower Management Center CLI?
Which command-line mode is supported from the Cisco Firepower Management Center CLI?A . privilegedB . userC . configurationD . adminView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/command_line_reference.pdf
In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)
In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)A . Traffic inspection can be interrupted temporarily when configuration changes are deployed.B . The system performs intrusion inspection followed by file inspection.C . They can block traffic based on Security Intelligence data.D . File...
Which action should be taken after editing an object that is used inside an access control policy?
Which action should be taken after editing an object that is used inside an access control policy?A . Delete the existing object in use.B . Refresh the Cisco FMC GUI for the access control policy.C . Redeploy the updated configuration.D . Create another rule using a different object name.View AnswerAnswer:...