Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)
Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)A . Redundant InterfaceB . EtherChannelC . SpeedD . Media TypeE . DuplexView AnswerAnswer: CE Explanation: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/fdm/fptd-fdm-config-guide-610/fptd-fdminterfaces.html
What are the minimum requirements to deploy a managed device inline?
What are the minimum requirements to deploy a managed device inline?A . inline interfaces, security zones, MTU, and modeB . passive interface, MTU, and modeC . inline interfaces, MTU, and modeD . passive interface, security zone, MTU, and modeView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-configguide-v65/ips_device_deployments_and_configuration.html
When creating a report template, how can the results be limited to show only the activity of a specific subnet?
When creating a report template, how can the results be limited to show only the activity of a specific subnet?A . Create a custom search in Firepower Management Center and select it in each section of the report.B . Add an Input Parameter in the Advanced Settings of the report,...
Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)
Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)A . The units must be the same versionB . Both devices can be part of a different group that must be in the same domain when configured within the FMD . The units...
Which policy rule is included in the deployment of a local DMZ during the initial deployment of a Cisco NGFW through the Cisco FMC GUI?
Which policy rule is included in the deployment of a local DMZ during the initial deployment of a Cisco NGFW through the Cisco FMC GUI?A . a default DMZ policy for which only a user can change the IP addresses.B . deny ip anyC . no policy rule is includedD...
Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)
Which two OSPF routing features are configured in Cisco FMC and propagated to Cisco FTD? (Choose two.)A . OSPFv2 with IPv6 capabilitiesB . virtual linksC . SHA authentication to OSPF packetsD . area boundary router type 1 LSA filteringE . MD5 authentication to OSPF packetsView AnswerAnswer: BD Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-configguide-v62/ospf_for_firepower_threat_defense.html
What is the difference between inline and inline tap on Cisco Firepower?
What is the difference between inline and inline tap on Cisco Firepower?A . Inline tap mode can send a copy of the traffic to another device.B . Inline tap mode does full packet capture.C . Inline mode cannot do SSL decryption.D . Inline mode can drop malicious traffic.View AnswerAnswer: D
With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?
With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?A . inline setB . passiveC . routedD . inline tapView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/interface_overview_for_firepower_threat_defense.html
Which two deployment types support high availability? (Choose two.)
Which two deployment types support high availability? (Choose two.)A . transparentB . routedC . clusteredD . intra-chassis multi-instanceE . virtual appliance in public cloudView AnswerAnswer: AB Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config guide-v61/firepower_threat_defense_high_availability.html
Which two actions can be used in an access control policy rule? (Choose two.)
Which two actions can be used in an access control policy rule? (Choose two.)A . Block with ResetB . MonitorC . AnalyzeD . DiscoverE . Block ALLView AnswerAnswer: AB Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asafirepower-module-user-guide-v541/AC-Rules-Tuning-Overview.html#71854