Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)
Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)A . Redundant InterfaceB . EtherChannelC . SpeedD . Media TypeE . DuplexView AnswerAnswer: CE Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/fdm/fptd-fdm-config-guide-610/fptdfdm-interfaces.html
With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?
With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?A . inline setB . passiveC . routedD . inline tapView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/interface_overview_for_firepower_threat_defense.html
What is the difference between inline and inline tap on Cisco Firepower?
What is the difference between inline and inline tap on Cisco Firepower?A . Inline tap mode can send a copy of the traffic to another device.B . Inline tap mode does full packet capture.C . Inline mode cannot do SSL decryption.D . Inline mode can drop malicious traffic.View AnswerAnswer: A
When do you need the file-size command option during troubleshooting with packet capture?
When do you need the file-size command option during troubleshooting with packet capture?A . when capture packets are less than 16 MBB . when capture packets are restricted from the secondary memoryC . when capture packets exceed 10 GBD . when capture packets exceed 32 MBView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-configguide-v62/troubleshooting_the_system.html
Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?
Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?A . configure high-availability resumeB . configure high-availability disableC . system support network-optionsD . configure high-availability suspendView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-configguide-v61/firepower_threat_defense_high_availability.html
What is a valid Cisco AMP file disposition?
What is a valid Cisco AMP file disposition?A . non-maliciousB . malwareC . known-goodD . pristineView AnswerAnswer: B Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Reference_a_wrapper_Chapter_topic_here.html
Which description of a correlation, policy configuration in the Cisco Firepower Management Center, is true?
Which description of a correlation, policy configuration in the Cisco Firepower Management Center, is true?A . Correlation policy priorities override whitelist priorities.B . The system displays correlation policies that are created on all of the domains in a multidomain deployment.C . You cannot add a host profile qualification to a...
What are the minimum requirements to deploy a managed device inline?
What are the minimum requirements to deploy a managed device inline?A . inline interfaces, security zones, MTU, and modeB . passive interface, MTU, and modeC . inline interfaces, MTU, and modeD . passive interface, security zone, MTU, and modeView AnswerAnswer: C Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-configguide-v65/ips_device_deployments_and_configuration.html
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?A . Add the malicious file to the block list.B . Send a snapshot to Cisco for technical support.C . Forward the result of the investigation to an external threat-analysis engine.D ....
Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)
Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)A . EIGRPB . OSPFC . static routingD . IS-ISE . BGPView AnswerAnswer: BE Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/fdm/fptd-fdm-config-guide-660/fptdfdm-routing.html