Cisco 300-710 Exam
Securing Networks with Cisco Firepower (300-710 SNCF) (Page 10 )

Updated On: 1-Feb-2026

Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)

  1. BGPv6
  2. ECMP with up to three equal cost paths across multiple interfaces
  3. ECMP with up to three equal cost paths across a single interface
  4. BGPv4 in transparent firewall mode
  5. BGPv4 with nonstop forwarding

Answer(s): A,C


Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-config- guide-v601/fpmc-config-guide-v60_chapter_01100011.html#ID-2101-0000000e



An engineer configures a network discovery policy on Cisco FMC. Upon configuration, it is noticed that excessive and misleading events filing the database and overloading the Cisco FMC. A monitored NAT device is executing multiple updates of its operating system in a short period of time.
What configuration change must be made to alleviate this issue?

  1. Leave default networks.
  2. Change the method to TCP/SYN.
  3. Increase the number of entries on the NAT device.
  4. Exclude load balancers and NAT devices.

Answer(s): D


Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config- guide-v60/Network_Discovery_Policies.html



A company has many Cisco FTD devices managed by a Cisco FMC. The security model requires that access control rule logs be collected for analysis. The security engineer is concerned that the Cisco FMC will not be able to process the volume of logging that will be generated.
Which configuration addresses this concern?

  1. Send Cisco FTD connection events and security events directly to SIEM system for storage and analysis.
  2. Send Cisco FTD connection events and security events to a cluster of Cisco FMC devices for storage and analysis.
  3. Send Cisco FTD connection events and security events to Cisco FMC and configure it to forward logs to SIEM for storage and analysis.
  4. Send Cisco FTD connection events directly to a SIEM system and forward security events from Cisco FMC to the SIEM system for storage and analysis.

Answer(s): C



A network administrator reviews the file report for the last month and notices that all file types, except exe. show a disposition of unknown.
What is the cause of this issue?

  1. The malware license has not been applied to the Cisco FTD.
  2. The Cisco FMC cannot reach the Internet to analyze files.
  3. A file policy has not been applied to the access policy.
  4. Only Spero file analysis is enabled.

Answer(s): D


Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config- guide-v60/Reference_a_wrapper_Chapter_topic_here.html



An organization does not want to use the default Cisco Firepower block page when blocking HTTP traffic. The organization wants to include information about its policies and procedures to help educate the users whenever a block occurs.
Which two steps must be taken to meet these requirements? (Choose two.)

  1. Modify the system-provided block page result using Python.
  2. Create HTML code with the information for the policies and procedures.
  3. Edit the HTTP request handling in the access control policy to customized block.
  4. Write CSS code with the information for the policies and procedures.
  5. Change the HTTP response in the access control policy to custom.

Answer(s): B,E



Viewing page 10 of 53
Viewing questions 46 - 50 out of 412 questions



Post your Comments and Discuss Cisco 300-710 exam prep with other Community members:

Join the 300-710 Discussion