When do you need the file-size command option during troubleshooting with packet capture?

When do you need the file-size command option during troubleshooting with packet capture?A . when capture packets are less than 16 MBB . when capture packets are restricted from the secondary memoryC . when capture packets exceed 10 GBD . when capture packets exceed 32 MBView AnswerAnswer: D Explanation: Reference:...

August 6, 2024 No Comments READ MORE +

Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)

Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)A . dynamic key mapping objects that help link HTTP and HTTPS GET requests to Layer 7 application protocols.B . reputation-based objects that represent Security Intelligence feeds and lists, application filters based on category and reputation, and...

August 6, 2024 No Comments READ MORE +

Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?

Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?A . Add the malicious file to the block list.B . Send a snapshot to Cisco for technical support.C . Forward the result of the investigation to an external threat-analysis engine.D ....

August 6, 2024 No Comments READ MORE +

What is a result of enabling Cisco FTD clustering?

What is a result of enabling Cisco FTD clustering?A . For the dynamic routing feature, if the master unit fails, the newly elected master unit maintains all existing connections.B . Integrated Routing and Bridging is supported on the master unit.C . Site-to-site VPN functionality is limited to the master unit,...

August 5, 2024 No Comments READ MORE +

Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?

Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?A . configure manager local 10.0.0.10 Cisco123B . configure manager add Cisco123 10.0.0.10C . configure manager local Cisco123 10.0.0.10D . configure manager...

August 5, 2024 No Comments READ MORE +

Which policy must be configured to accomplish this goal?

An administrator is optimizing the Cisco FTD rules to improve network performance, and wants to bypass inspection for certain traffic types to reduce the load on the Cisco FTD. Which policy must be configured to accomplish this goal?A . prefilterB . intrusionC . identityD . URL filteringView AnswerAnswer: A

August 5, 2024 No Comments READ MORE +

How must the devices be implemented in this environment?

An engineer must configure high availability for the Cisco Firepower devices. The current network topology does not allow for two devices to pass traffic concurrently. How must the devices be implemented in this environment?A . in active/active modeB . in a cluster span EtherChannelC . in active/passive modeD . in...

August 5, 2024 No Comments READ MORE +

In which two places can thresholding settings be configured? (Choose two.)

In which two places can thresholding settings be configured? (Choose two.)A . on each IPS ruleB . globally, within the network analysis policyC . globally, per intrusion policyD . on each access control ruleE . per preprocessor, within the network analysis policyView AnswerAnswer: AC Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-Global-Threshold.pdf

August 5, 2024 No Comments READ MORE +

Which policy type should be used to configure the ASA rules during this phase of the migration?

An administrator is working on a migration from Cisco ASA to the Cisco FTD appliance and needs to test the rules without disrupting the traffic. Which policy type should be used to configure the ASA rules during this phase of the migration?A . identityB . IntrusionC . Access ControlD ....

August 5, 2024 No Comments READ MORE +

What is a valid Cisco AMP file disposition?

What is a valid Cisco AMP file disposition?A . non-maliciousB . malwareC . known-goodD . pristineView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide- v60/Reference_a_wrapper_Chapter_topic_here.html

August 5, 2024 No Comments READ MORE +