Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)

Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)A . BGPv6B . ECMP with up to three equal cost paths across multiple interfacesC . ECMP with up to three equal cost paths across a single interfaceD . BGPv4 in transparent firewall modeE . BGPv4 with nonstop...

March 1, 2022 No Comments READ MORE +

Which command should be used on the Cisco FTD CLIto capture all the packets that hit an interface?

Which command should be used on the Cisco FTD CLIto capture all the packets that hit an interface?A . configure coredump packet-engine enableB . capture-trafficC . captureD . capture WORDView AnswerAnswer: C Explanation: Reason: the command "capture-traffic" is used for SNORT Engine Captures. To capture a LINA Engine Capture, you...

March 1, 2022 No Comments READ MORE +

Which two deployment types support high availability? (Choose two.)

Which two deployment types support high availability? (Choose two.)A . transparentB . routedC . clusteredD . intra-chassis multi-instanceE . virtualappliance in public cloudView AnswerAnswer: A,B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/firepower_threat_defense_high_availability.html

February 28, 2022 No Comments READ MORE +

Within Cisco Firepower Management Center, where does a user add or modify widgets?

Within Cisco Firepower Management Center, where does a user add or modify widgets?A . dashboardB . reportingC . context explorerD . summary toolView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Using_Dashboards.html

February 28, 2022 No Comments READ MORE +

Which Cisco Firepower feature is used to reduce the number of events received in a period of time?

Which Cisco Firepower feature is used to reduce the number of events received in a period of time?A . rate-limitingB . suspendingC . correlationD . thresholdingView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-Global-Threshold.html

February 28, 2022 No Comments READ MORE +

What is the cause of this issue?

A network administrator reviews the file report for the last month and notices that all file types, except exe. show a disposition of unknown. What is the cause of this issue?A . The malware license has not been applied to the Cisco FTC . The Cisco FMC cannot reach the...

February 28, 2022 No Comments READ MORE +

Which object type supports object overrides?

Which object type supports object overrides?A . time rangeB . security group tagC . network objectD . DNS server groupView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Reusable_Objects.html#concept_8BFE8B9A83D742D9B647A74F7AD50053

February 28, 2022 No Comments READ MORE +

Which command-line mode is supported from the Cisco Firepower Management Center CLI?

Which command-line mode is supported from the Cisco Firepower Management Center CLI?A . privilegedB . userC . configurationD . adminView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/command_line_reference.pdf

February 27, 2022 No Comments READ MORE +

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)A . Traffic inspection can be interrupted temporarily when configuration changes are deployed.B . The system performs intrusion inspection followed by file inspection.C . They can block traffic based on Security Intelligence data.D . File...

February 27, 2022 No Comments READ MORE +

Which action should be taken after editing an object that is used inside an access control policy?

Which action should be taken after editing an object that is used inside an access control policy?A . Delete the existing object in use.B . Refresh the Cisco FMC GUI for the access control policy.C . Redeploy the updated configuration.D . Create another rule using a different object name.View AnswerAnswer:...

February 26, 2022 No Comments READ MORE +