Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)

Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)A . Redundant InterfaceB . EtherChannelC . SpeedD . Media TypeE . DuplexView AnswerAnswer: CE Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/fdm/fptd-fdm-config-guide-610/fptdfdm-interfaces.html

June 21, 2021 No Comments READ MORE +

With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?

With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?A . inline setB . passiveC . routedD . inline tapView AnswerAnswer: B Explanation:   https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/interface_overview_for_firepower_threat_defense.html

June 21, 2021 No Comments READ MORE +

What is the difference between inline and inline tap on Cisco Firepower?

What is the difference between inline and inline tap on Cisco Firepower?A . Inline tap mode can send a copy of the traffic to another device.B . Inline tap mode does full packet capture.C . Inline mode cannot do SSL decryption.D . Inline mode can drop malicious traffic.View AnswerAnswer: A

June 20, 2021 1 Comment READ MORE +

When do you need the file-size command option during troubleshooting with packet capture?

When do you need the file-size command option during troubleshooting with packet capture?A . when capture packets are less than 16 MBB . when capture packets are restricted from the secondary memoryC . when capture packets exceed 10 GBD . when capture packets exceed 32 MBView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-configguide-v62/troubleshooting_the_system.html

June 20, 2021 No Comments READ MORE +

Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?

Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?A . configure high-availability resumeB . configure high-availability disableC . system support network-optionsD . configure high-availability suspendView AnswerAnswer: B Explanation:   https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-configguide-v61/firepower_threat_defense_high_availability.html

June 20, 2021 No Comments READ MORE +

What is a valid Cisco AMP file disposition?

What is a valid Cisco AMP file disposition?A . non-maliciousB . malwareC . known-goodD . pristineView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Reference_a_wrapper_Chapter_topic_here.html

June 19, 2021 No Comments READ MORE +

Which description of a correlation, policy configuration in the Cisco Firepower Management Center, is true?

Which description of a correlation, policy configuration in the Cisco Firepower Management Center, is true?A . Correlation policy priorities override whitelist priorities.B . The system displays correlation policies that are created on all of the domains in a multidomain deployment.C . You cannot add a host profile qualification to a...

June 19, 2021 No Comments READ MORE +

What are the minimum requirements to deploy a managed device inline?

What are the minimum requirements to deploy a managed device inline?A . inline interfaces, security zones, MTU, and modeB . passive interface, MTU, and modeC . inline interfaces, MTU, and modeD . passive interface, security zone, MTU, and modeView AnswerAnswer: C Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-configguide-v65/ips_device_deployments_and_configuration.html

June 18, 2021 No Comments READ MORE +

Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?

Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?A . Add the malicious file to the block list.B . Send a snapshot to Cisco for technical support.C . Forward the result of the investigation to an external threat-analysis engine.D ....

June 18, 2021 No Comments READ MORE +

Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)

Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)A . EIGRPB . OSPFC . static routingD . IS-ISE . BGPView AnswerAnswer: BE Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/fdm/fptd-fdm-config-guide-660/fptdfdm-routing.html

June 18, 2021 No Comments READ MORE +