300-710 無料問題集「Cisco Securing Networks with Cisco Firepower」
A company wants a solution to aggregate the capacity of two Cisco FTD devices to make the best use of resources such as bandwidth and connections per second. Which order of steps must be taken across the Cisco FTDs with Cisco FMC to meet this requirement?
正解:B
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
The CIO asks a network administrator to present to management a dashboard that shows custom analysis tables for the top DNS queries URL category statistics, and the URL reputation statistics.
Which action must the administrator take to quickly produce this information for management?
Which action must the administrator take to quickly produce this information for management?
正解:A
解答を投票する
A VPN user is unable to conned lo web resources behind the Cisco FTD device terminating the connection. While troubleshooting, the network administrator determines that the DNS responses are not getting through the Cisco FTD.
What must be done to address this issue while still utilizing Snort IPS rules?
What must be done to address this issue while still utilizing Snort IPS rules?
正解:C
解答を投票する
Refer to the exhibit. An organization has an access control rule with the intention of sending all social media traffic for inspection. After using the rule for some time, the administrator notices that the traffic is not being inspected, but is being automatically allowed.
What must be done to address this issue?

What must be done to address this issue?

正解:D
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
A network engineer is deploying a pair of Cisco Secure Firewall Threat Defense devices managed by Cisco Secure Firewall Management Center for High Availability. Internet access is a high priority for the business and therefore they have invested in internet circuits from two different ISPs. The requirement from the customer is that internet access must be available to their users even if one of the ISPs is down. Which two features must be deployed to achieve this requirement? (Choose two.)
正解:A、C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)
An engineer is deploying a Cisco ASA Secure Firewall module. The engineer must be able to examine traffic without impacting the network, and the ASA has been deployed with a single context. Which ASA Secure Firewall module deployment mode must be implemented to meet the requirements?
正解:D
解答を投票する
Refer to the exhibit. An engineer is modifying an access control pokey to add a rule to inspect all DNS traffic that passes through the firewall.
After making the change and deploying the pokey they see that DNS traffic is not bang inspected by the Snort engine. What is the problem?

After making the change and deploying the pokey they see that DNS traffic is not bang inspected by the Snort engine. What is the problem?

正解:C
解答を投票する