In which two places can thresholding settings be configured? (Choose two.)
In which two places can thresholding settings be configured? (Choose two.)A . on each IPS ruleB . globally, within the network analysis policyC . globally, per intrusion policyD . on each access control ruleE . per preprocessor, within the network analysis policyView AnswerAnswer: A,C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module-user-guide-v541/Intrusion-Global-Threshold.pdf
Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)
Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)A . Redundant InterfaceB . EtherChannelC . SpeedD . Media TypeE . DuplexView AnswerAnswer: C,E Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/fdm/fptd-fdm-config-guide-610/fptd-fdm-interfaces.html
Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)
Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)A . An option to re-apply NAT and VPN policies during registration is available, so users do not need to re-apply the policies after registration is completed.B . Before re-adding the device in Cisco FMC,...
Which command must be run to generate troubleshooting files on an FTD?
Which command must be run to generate troubleshooting files on an FTD?A . system support view-filesB . sudo sf_troubleshoot.plC . system generate-troubleshoot allD . show tech-supportView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/sourcefire-defense-center/117663-technote-SourceFire-00.html
Which command is run at the CLI when logged in to an FTD unit, to determine whether the unit is managed locally or by a remote FMC server?
Which command is run at the CLI when logged in to an FTD unit, to determine whether the unit is managed locally or by a remote FMC server?A . system generate-troubleshootB . show configuration sessionC . show managersD . show running-config | include managerView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/command_ref/b_Command_Reference_for_Firepower_Threat_Defense/c_3.html
What is the benefit of selecting the trace option for packet capture?
What is the benefit of selecting the trace option for packet capture?A . The option indicates whether the packet was dropped or successful.B . The option indicated whether the destination host responds through a different path.C . The option limits the number of packets that are captured.D . The option...
What is the difference between inline and inline tap on Cisco Firepower?
What is the difference between inline and inline tap on Cisco Firepower?A . Inline tap mode can send a copy of the traffic to another device.B . Inline tap mode does full packet capture.C . Inline mode cannot do SSL decryption.D . Inline mode can drop malicious traffic.View AnswerAnswer: A
Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)
Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)A . BGPv6B . ECMP with up to three equal cost paths across multiple interfacesC . ECMP with up to three equal cost paths across a single interfaceD . BGPv4 in transparent firewall modeE . BGPv4 with nonstop...
Which Firepower feature allows users to configure bridges in routed mode and enables devices to perform Layer 2 switching between interfaces?
Which Firepower feature allows users to configure bridges in routed mode and enables devices to perform Layer 2 switching between interfaces?A . FlexConfigB . BDIC . SGTD . IRBView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/relnotes/Firepower_System_Release_Notes_Version_620/new_features_and_functionality.html
Which group within Cisco does the Threat Response team use for threat analysis and research?
Which group within Cisco does the Threat Response team use for threat analysis and research?A . Cisco Deep AnalyticsB . OpenDNS GroupC . Cisco Network ResponseD . Cisco TalosView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/products/security/threat-response.html#~benefits