Free 300-710 Exam Braindumps (page: 35)

Page 35 of 66

What is a characteristic of bridge groups on a Cisco FTD?

  1. In routed firewall mode, routing between bridge groups must pass through a routed interface.
  2. In routed firewall mode, routing between bridge groups is supported.
  3. In transparent firewall mode, routing between bridge groups is supported
  4. Routing between bridge groups is achieved only with a router-on-a-stick configuration on a connected router

Answer(s): B



An engineer is attempting to create a new dashboard within the Cisco FMC to have a single view with widgets from many of the other dashboards. The goal is to have a mixture of threat and security related widgets along with Cisco Firepower device health information.
Which two widgets must be configured to provide this information? (Choose two).

  1. Intrusion Events
  2. Correlation Information
  3. Appliance Status
  4. Current Sessions
  5. Network Compliance

Answer(s): A,E



An engineer has been tasked with using Cisco FMC to determine if files being sent through the network are malware.
Which two configuration tasks must be performed to achieve this file lookup? (Choose two).

  1. The Cisco FMC needs to include a SSL decryption policy.
  2. The Cisco FMC needs to connect to the Cisco AMP for Endpoints service.
  3. The Cisco FMC needs to connect to the Cisco ThreatGrid service directly for sandboxing.
  4. The Cisco FMC needs to connect with the FireAMP Cloud.
  5. The Cisco FMC needs to include a file inspection policy for malware lookup.

Answer(s): B,E



An engineer configures an access control rule that deploys file policy configurations to security zones or tunnel zones, and it causes the device to restart.
What is the reason for the restart?

  1. Source or destination security zones in the access control rule matches the security zones that are associated with interfaces on the target devices.
  2. The source tunnel zone in the rule does not match a tunnel zone that is assigned to a tunnel rule in the destination policy.
  3. Source or destination security zones in the source tunnel zone do not match the security zones that are associated with interfaces on the target devices.
  4. The source tunnel zone in the rule does not match a tunnel zone that is assigned to a tunnel rule in the source policy.

Answer(s): A



Page 35 of 66



Post your Comments and Discuss Cisco® 300-710 exam with other Community members:

Neo commented on October 10, 2024
Gets easier as you go along
SOUTH AFRICA
upvote

Neo commented on October 10, 2024
Need more practice
SOUTH AFRICA
upvote

Violet commented on October 10, 2024
Need more practice
SOUTH AFRICA
upvote

Neo commented on October 10, 2024
Challenging
SOUTH AFRICA
upvote

Kopano commented on October 10, 2024
Prep going well
SOUTH AFRICA
upvote

Neo commented on October 10, 2024
Happy with the material
SOUTH AFRICA
upvote

Emily commented on October 09, 2024
A bit challe
SOUTH AFRICA
upvote

Emily commented on October 09, 2024
grt resource
SOUTH AFRICA
upvote