Cisco 300-710 Exam
Securing Networks with Cisco Firepower (300-710 SNCF) (Page 8 )

Updated On: 1-Feb-2026

Which Firepower feature allows users to configure bridges in routed mode and enables devices to perform Layer 2 switching between interfaces?

  1. FlexConfig
  2. BDI
  3. SGT
  4. IRB

Answer(s): D


Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/620/relnotes/ Firepower_System_Release_Notes_Version_620/new_features_and_functionality.html



In which two places can thresholding settings be configured? (Choose two.)

  1. on each IPS rule
  2. globally, within the network analysis policy
  3. globally, per intrusion policy
  4. on each access control rule
  5. per preprocessor, within the network analysis policy

Answer(s): A,C


Reference:

https://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user- guide/asa- firepower-module-user-guide-v541/Intrusion-Global-Threshold.pdf



In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

  1. Traffic inspection can be interrupted temporarily when configuration changes are deployed.
  2. The system performs intrusion inspection followed by file inspection.
  3. They can block traffic based on Security Intelligence data.
  4. File policies use an associated variable set to perform intrusion prevention.
  5. The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.

Answer(s): A,C


Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config- guide-v60/Access_Control_Using_Intrusion_and_File_Policies.html



Which two types of objects are reusable and supported by Cisco FMC? (Choose two.)

  1. dynamic key mapping objects that help link HTTP and HTTPS GET requests to Layer 7 application protocols.
  2. reputation-based objects that represent Security Intelligence feeds and lists, application filters based on category and reputation, and file lists
  3. network-based objects that represent IP address and networks, port/protocols pairs, VLAN tags, security zones, and origin/destination country
  4. network-based objects that represent FQDN mappings and networks, port/protocol pairs, VXLAN tags, security zones and origin/destination country
  5. reputation-based objects, such as URL categories

Answer(s): B,C


Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config- guide-v62/reusable_objects.html#ID-2243-00000414



A network administrator notices that remote access VPN users are not reachable from inside the network. It is determined that routing is configured correctly, however return traffic is entering the firewall but not leaving it.
What is the reason for this issue?

  1. A manual NAT exemption rule does not exist at the top of the NAT table.
  2. An external NAT IP address is not configured.
  3. An external NAT IP address is configured to match the wrong interface.
  4. An object NAT exemption rule does not exist at the top of the NAT table.

Answer(s): A


Reference:

https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212702- configure-and-verify-nat-on-ftd.html



Viewing page 8 of 53
Viewing questions 36 - 40 out of 412 questions



Post your Comments and Discuss Cisco 300-710 exam prep with other Community members:

Join the 300-710 Discussion