Q and A 300-710 Flashcards
Which limitation applies to Cisco FMC dashboards in a multi-domain environment?
A. Child domains are able to view but not edit dashboards that originate from an ancestor domain.
B. Child domains have access to only a limited set of widgets from ancestor domains.
C. Only the administrator of the top ancestor domain is able to view dashboards.
D. Child domains are not able to view dashboards that originate from an ancestor domain.
D. Child domains are not able to view dashboards that originate from an ancestor domain.
Verified
In a multidomain deployment, you cannot view dashboards from ancestor domains; however, you can create new dashboards that are copies of the higher-level dashboards.
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Using_Dashboards.html
The limitation that applies to Cisco FMC dashboards in a multi-domain environment is:
D. Child domains are not able to view dashboards that originate from an ancestor domain.
In a multi-domain deployment, child domains cannot view dashboards from ancestor domains. However, they can create new dashboards that are copies of the higher-level dashboards²³. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹²³.
Source: Conversation with Bing, 12/11/2023
(1) Firepower Management Center Configuration Guide, Version 6.2.3 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/dashboards.html.
(2) Firepower Management Center Administration Guide, 7.1 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/710/management-center-admin-71/health-dashboards.html.
(3) Firepower Management Center Configuration Guide, Version 6.2.3 - Domain …. https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/domain_management.html.
(4) Which limitation applies to Cisco Firepower Management Center …. https://vceguide.com/which-limitation-applies-to-cisco-firepower-management-center-dashboards-in-a-multidomain-environment/.
An organization does not want to use the default Cisco Firepower block page when blocking HTTP traffic. The organization wants to include information about its policies and procedures to help educate the users whenever a block occurs. Which two steps must be taken to meet these requirements? (Choose two.)
A. Edit the HTTP request handling in the access control policy to customized block
B. Modify the system-provided block page result using Python
C. Create HTML code with the information for the policies and procedures
D. Change the HTTP response in the access control policy to custom
E. Write CSS code with the information for the policies and procedures
C. Create HTML code with the information for the policies and procedures
D. Change the HTTP response in the access control policy to custom
Verified
To customize the Cisco Firepower block page when blocking HTTP traffic, the following two steps must be taken:
- Create HTML code with the information for the policies and procedures²³. This HTML code will be used to create the custom block page that will be displayed to the users.
- Change the HTTP response in the access control policy to custom¹². This will ensure that the custom block page is used instead of the default Cisco Firepower block page.
So, the correct answers are C. Create HTML code with the information for the policies and procedures and D. Change the HTTP response in the access control policy to custom. Please note that while Python can be used to modify web pages, it’s not typically used within the context of Cisco Firepower’s block page customization². Similarly, CSS can be used to style the block page, but it’s not necessary for including the organization’s policies and procedures². For more details, please refer to the Cisco documentation¹²³.
Source: Conversation with Bing, 12/11/2023
(1) Access Control Policy - Block Response Page - Cisco Community. https://community.cisco.com/t5/network-security/access-control-policy-block-response-page/td-p/2570606.
(2) Firepower URL Blocking page setup and management - WIRES AND WI.FI. https://www.wiresandwi.fi/blog/firepower-url-blocking-page-setup-and-management.
(3) HTTP Response Pages and Interactive Blocking - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/fpmc-config-guide-v60_chapter_01011100.pdf.
(4) Which two steps must be taken to meet these requirements?. https://www.exam4training.com/which-two-steps-must-be-taken-to-meet-these-requirements/.
(5) undefined. http://mycompany.com/logo.jpg.
Which action must be taken on the Cisco FMC when a packet bypass is configured in case the Snort engine is down or a packet takes too long to process?
A. Enable Automatic Application Bypass.
B. Add a Bypass Threshold policy for failures.
C. Configure Fastpath rules to bypass inspection.
D. Enable Inspect Local Router Traffic.
A. Enable Automatic Application Bypass.
Verified
Configure Automatic Application Bypass
Automatic Application Bypass (AAB) allows packets to bypass detection if Snort is down or if a packet takes too long to process. AAB causes Snort to restart within ten minutes of the failure, and generates troubleshooting data that can be analyzed to investigate the cause of the Snort failure.
https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/device_management_basics.html#:~:text=Rules%20(8000%20Series)-,Configure%20Automatic%20Application%20Bypass,-Automatic%20Application%20Bypass
An administrator is adding a QoS policy to a Cisco FTD deployment. When a new rule is added to the policy and QoS is applied on “Interfaces in Destination Interface Objects”, no interface objects are available. What is the problem?
A. The FTD is out of available resources for use, so QoS cannot be added.
B. The network segments that the interfaces are on do not have contiguous IP space.
C. A conflict exists between the destination interface types that is preventing QoS from being added.
D. QoS is available only on routed interfaces, and this device is in transparent mode.
D. QoS is available only on routed interfaces, and this device is in transparent mode.
The problem is that QoS is available only on routed interfaces, and this device is in transparent mode². So, the correct answer is D. QoS is available only on routed interfaces, and this device is in transparent mode. Please note that QoS policies deployed to managed devices govern rate limiting². Each QoS policy can target multiple devices; each device can have one deployed QoS policy at a time². For more details, please refer to the Cisco documentation².
Source: Conversation with Bing, 12/11/2023
(1) Quality of Service (QoS) for Firepower Threat Defense - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/quality_of_service_qos.pdf.
(2) QoS Policy On Firepower Threat Defense Configuration. https://community.cisco.com/t5/security-blogs/qos-policy-on-firepower-threat-defense-configuration/ba-p/4671162.
(3) TEST BORRADO, QUIZÁS LE INTERESE 300.710 - Tests Online. https://www.daypo.com/300-710.html.
(4) Test examen 5 19 - Tests Online. https://www.daypo.com/examen-5-19.html. https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/quality_of_service__qos__for_firepower_threat_defense.html
A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address https:///capture/CAPI/pcap/test.pcap, an error 403: Forbidden is given instead of the PCAP file. Which action must the engineer take to resolve this issue?
A. Disable the proxy setting on the browser
B. Disable the HTTPS server and use HTTP instead
C. Use the Cisco FTD IP address as the proxy server setting on the browser
D. Enable the HTTPS server for the device platform policy
D. Enable the HTTPS server for the device platform policy
To resolve the issue of receiving an error 403: Forbidden instead of the PCAP file when trying to export packet captures from the Cisco FMC web browser, the engineer must D. Enable the HTTPS server for the device platform policy⁴⁵. This action will allow the engineer to access the required files over a secure connection. Please note that disabling the proxy setting on the browser or using the Cisco FTD IP address as the proxy server setting on the browser may not resolve this issue⁴⁵. Similarly, disabling the HTTPS server and using HTTP instead is not recommended due to security concerns⁴⁵. For more details, please refer to the Cisco documentation⁴⁵.
Source: Conversation with Bing, 12/11/2023
(1) Which action must the engineer take to resolve this issue? - VCEguide.com. https://vceguide.com/which-action-must-the-engineer-take-to-resolve-this-issue-2/.
(2) [25-Sep-2021] New 2020 CCNP 300-710 SNCF Dumps with VCE and PDF from …. https://www.ciscovceplus.com/25-sep-2021-new-2020-ccnp-300-710-sncf-dumps-with-vce-and-pdf-from-passleader-update-questions.html?upm_export=html.
(3) Passive ID 403 forbidden in packet capture. - Cisco Community. https://community.cisco.com/t5/network-access-control/passive-id-403-forbidden-in-packet-capture/td-p/3538322.
(4) Use Firepower Threat Defense Captures and Packet Tracer - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/212474-working-with-firepower-threat-defense-f.html.
(5) Export/Copy Network Objects from FMC - Cisco Community. https://community.cisco.com/t5/network-security/export-copy-network-objects-from-fmc/td-p/4140622.
(6) undefined. https://www.cisco.com/c/en/us/td/docs/security/firepower/650/api/REST/Firepower_Management_Center_REST_API_Quick_Start_Guide_650/objects_in_the_rest_api.html.
An analyst using the security analyst account permissions is trying to view the Correlations Events Widget but is not able to access it. However, other dashboards are accessible. Why is this occurring?
A. The widget is configured to display only when active events are present
B. The security analyst role does not have permission to view this widget
C. An API restriction within the Cisco FMC is preventing the widget from displaying
D. The widget is not configured within the Cisco FMC
Absolutely no good answer
D. The widget is not configured within the Cisco FMC
This is what most in the community are going with. B is absolutely wrong.
An engineer must configure a Cisco FMC dashboard in a child domain. Which action must be taken so that the dashboard is visible to the parent domain?
A. Adjust policy inheritance settings
B. Add a separate widget
C. Create a copy of the dashboard
D. Add a separate tab
C. Create a copy of the dashboard
In a multidomain deployment, you cannot view dashboards from ancestor domains¹²⁴. However, you can create new dashboards that are copies of the higher-level dashboards¹²⁴. So, the correct answer is C. Create a copy of the dashboard. Please note that only the administrator of the top ancestor domain can view dashboards³. For more details, please refer to the Cisco documentation¹²⁴.
Source: Conversation with Bing, 12/11/2023
(1) Inheritance in Multidomain Environment in FTD - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/216497-inheritance-in-multidomain-environment-i.html.
(2) Firepower Management Center Configuration Guide, Version 6.2.3 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/dashboards.html.
(3) Firepower Management Center Administration Guide, 7.1 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/710/management-center-admin-71/health-dashboards.html.
(4) Which limitation applies to Cisco Firepower Management Center …. https://www.exam4training.com/which-limitation-applies-to-cisco-firepower-management-center-dashboards-in-a-multidomain-environment/.
A network engineer sets up a secondary Cisco FMC that is integrated with Cisco Security Packet Analyzer. What occurs when the secondary Cisco FMC synchronizes with the primary Cisco FMC? (Choose two)
A. The existing configuration for integration of the secondary Cisco FMC the Cisco Security Packet Analyzer is overwritten.
B. The synchronization between the primary and secondary Cisco FMC fails.
C. The existing integration configuration is replicated to the primary Cisco FMC.
D. The secondary Cisco FMC must be reintegrated with the Cisco Security Packet Analyzer after the synchronization.
A. The existing configuration for integration of the secondary Cisco FMC the Cisco Security Packet Analyzer is overwritten.
D. The secondary Cisco FMC must be reintegrated with the Cisco Security Packet Analyzer after the synchronization.
The correct answer is A. The existing configuration for integration of the secondary Cisco FMC the Cisco Security Packet Analyzer is overwritten.
According to the Cisco documentation¹², when setting up a high availability pair of Cisco FMCs, the primary unit’s policies are synchronized to the secondary unit. After this synchronization, the primary FMC becomes the active peer, while the secondary FMC becomes the standby peer, and the two units act as a single appliance for managed device and policy configuration. Therefore, any existing configuration on the secondary FMC, including the integration with the Cisco Security Packet Analyzer, is overwritten by the primary FMC’s configuration. The secondary FMC must be reintegrated with the Cisco Security Packet Analyzer after the synchronization.
Source: Conversation with Bing, 12/11/2023
(1) Firepower Management Center Configuration Guide, Version 6.2 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_management_center_high_availability.html.
(2) Firepower Management Center Administration Guide, 7.1 - High … - Cisco. https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/710/management-center-admin-71/system-ha.html.
(3) Configure High Availability on FMC - Cisco. https://www.cisco.com/c/en/us/support/docs/security/secure-firewall-management-center/221089-configure-high-availability-on-fmc.html.
An engineer is reviewing a ticket that requests to allow traffic for some devices that must connect to a server over 8699/udp. The request mentions only one IP address, 172.16.18.15, but the requestor asked for the engineer to open the port for all machines that have been trying to connect to it over the last week. Which action must the engineer take to troubleshoot this issue?
A. Use the context explorer to see the application blocks by protocol.
B. Filter the connection events by the source port 8699/udp.
C. Filter the connection events by the destination port 8699/udp.
D. Use the context explorer to see the destination port blocks.
C. Filter the connection events by the destination port 8699/udp.
The engineer should C. Filter the connection events by the destination port 8699/udp¹². This will allow the engineer to see all the devices that have been trying to connect to the server over the specified port in the last week. The engineer can then use this information to adjust the firewall rules accordingly. Please note that while the context explorer can provide useful information about blocked applications and ports, it may not provide the specific information needed in this case¹². Similarly, filtering by the source port may not yield the desired results, as the source port can vary for each device¹². For more details, please refer to the Cisco documentation¹².
Source: Conversation with Bing, 12/11/2023
(1) Firepower Management Center Device Configuration Guide, 7.1 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/access-prefilter.html.
(2) Firepower Management Center Administration Guide, 7.1 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/710/management-center-admin-71/health-troubleshoot.html.
(3) [30-Nov-2021] New 2020 CCNP 300-710 SNCF Dumps with VCE and PDF from …. https://www.ciscovceplus.com/30-nov-2021-new-2020-ccnp-300-710-sncf-dumps-with-vce-and-pdf-from-passleader-update-questions.html?upm_export=doc.
(4) Site to Site VPN Configuration on FTD Managed by FMC - Cisco. https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/215470-site-to-site-vpn-configuration-on-ftd-ma.html.
(5) Basic Troubleshooting For traffic through ASA Firewall. https://community.cisco.com/t5/security-knowledge-base/basic-troubleshooting-for-traffic-through-asa-firewall/ta-p/3162819.
A network administrator is troubleshooting access to a website hosted behind a Cisco FTD device. External clients cannot access the web server via HTTPS. The IP address configured on the web server is 192.168.7.46. The administrator is running the command capture CAP interface outside match ip any 192.168.7.46 255.255.255.255 but cannot see any traffic in the capture. Why is this occurring?
A. The capture must use the public IP address of the web server.
B. The packet capture shows only blocked traffic.
C. The FTD has no route to the web server.
D. The access policy is blocking the traffic.
A. The capture must use the public IP address of the web server.
The issue is occurring because A. The capture must use the public IP address of the web server¹². When capturing traffic on the outside interface of a Cisco FTD device, the capture must match the public IP address that the external clients are using to access the web server¹². This is because the FTD device performs Network Address Translation (NAT) on the traffic, translating the private IP address of the web server to a public IP address¹². Therefore, the capture command should be updated to match the public IP address of the web server¹². For more details, please refer to the Cisco documentation¹².
Source: Conversation with Bing, 12/11/2023
(1) Configure Management Access to FTD (HTTPS and SSH) via FMC - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200701-Configuration-of-Management-access-to-FT.html.
(2) Solved: FTD External Authentication - Cisco Community. https://community.cisco.com/t5/network-security/ftd-external-authentication/td-p/3044711.
(3) Test examen 5 19 - Tests Online. https://www.daypo.com/examen-5-19.html.
(4) Troubleshoot Common AnyConnect Communication Issues on FTD. https://www3-realm.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/216180-troubleshoot-common-anyconnect-communica.pdf.
(5) FTD RA VPN - DHCP Server configuration not working - Cisco Community. https://community.cisco.com/t5/network-security/ftd-ra-vpn-dhcp-server-configuration-not-working/td-p/4007398.
An engineer must deploy a Cisco FTD appliance via Cisco FMC to span a network segment to detect malware and threats. When setting the Cisco FTD interface mode, which sequence of actions meets this requirement?
A. Set to passive, and configure an access control policy with an intrusion policy and a file policy defined.
B. Set to passive, and configure an access control policy with a prefilter policy defined.
C. Set to none, and configure an access control policy with an intrusion policy and a file policy defined.
D. Set to none, and configure an access control policy with a prefilter policy defined.
A. Set to passive, and configure an access control policy with an intrusion policy and a file policy defined.
To deploy a Cisco FTD appliance via Cisco FMC for malware and threat detection, the interface mode should be set to passive and an access control policy with an intrusion policy and a file policy should be defined. Therefore, the correct sequence of actions is:
A. Set to passive, and configure an access control policy with an intrusion policy and a file policy defined.
This is because in a passive deployment, the FTD appliance can monitor network traffic for threats and malware without affecting the flow of traffic¹². The intrusion policy and file policy are essential components of the access control policy that enable the appliance to detect and handle threats¹².
Please note that this is a general recommendation and the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹²³.
Source: Conversation with Bing, 12/11/2023
(1) Install and Upgrade FTD on Firepower Appliances - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200886-installing-and-upgrading-firepower-threa.html.
(2) FMC to remote FTD deployment - Cisco Community. https://community.cisco.com/t5/network-security/fmc-to-remote-ftd-deployment/td-p/3217743.
(3) Firepower Management Center Configuration Guide, Version 7.0 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/interface_overview_for_firepower_threat_defense.html.
A company is deploying intrusion protection on multiple Cisco FTD appliances managed by Cisco FMC. Which system-provided policy must be selected if speed and detection are priorities?
A. Maximum Detection
B. Connectivity Over Security
C. Security Over Connectivity
D. Balanced Security and Connectivity
D. Balanced Security and Connectivity
Verified
The Balanced Security and Connectivity policy is designed to provide a balance between network speed and performance while maintaining effective cybersecurity measures. It prioritizes the detection of threats while also ensuring that network traffic flows smoothly and efficiently.
If speed and detection are priorities, the system-provided policy to be selected is:
D. Balanced Security and Connectivity
This policy is built for both speed and detection. Used together with the network analysis policy of the same name, it serves as a good starting point for most networks and deployment types². Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹²³.
Source: Conversation with Bing, 12/11/2023
(1) Cisco Firepower Threat Defense Configuration Guide for Firepower Device …. https://www.cisco.com/c/en/us/td/docs/security/firepower/710/fdm/fptd-fdm-config-guide-710/fptd-fdm-intrusion.html.
(2) Cisco Firepower Threat Defense Configuration Guide for Firepower Device …. https://www.cisco.com/c/en/us/td/docs/security/firepower/670/fdm/fptd-fdm-config-guide-670/fptd-fdm-intrusion.html.
(3) Cisco Firepower Threat Defense Configuration Guide for Firepower Device …. https://www.cisco.com/c/en/us/td/docs/security/firepower/623/fdm/fptd-fdm-config-guide-623/fptd-fdm-intrusion.html.
(4) Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting …. https://community.cisco.com/t5/security-knowledge-base/self-paced-learning-for-cisco-firepower-ngfw-ngips-amp-with/ta-p/3306922.
Upon detecting a flagrant threat on an endpoint, which two technologies instruct Cisco Identity Services Engine to contain the infected endpoint either manually or automatically? (Choose two.)
A. Cisco Stealthwatch
B. Cisco ASA 5500 Series
C. Cisco FMC
D. Cisco ASR 7200 Series
E. Cisco AMP
C. Cisco FMC
E. Cisco AMP
Verified.
In the context of this question FMC makes more sense than Stealthwatch.
A network administrator tries to convert from LDAP to LDAPS for VPN user authentication on a Cisco FTD. Which action must be taken on the Cisco FTD objects to accomplish this task?
A. Identify the LDAPS cipher suite and use a Cipher Suite List object to define the Cisco FTD connection requirements.
B. Modify the Policy List object to define the session requirements for LDAPS.
C. Add a Key Chain object to acquire the LDAPS certificate.
D. Create a Certificate Enrollment object to get the LDAPS certificate needed.
D. Create a Certificate Enrollment object to get the LDAPS certificate needed.
To convert from LDAP to LDAPS for VPN user authentication on a Cisco FTD, the action that must be taken on the Cisco FTD objects is:
D. Create a Certificate Enrollment object to get the LDAPS certificate needed.
This is because when converting from LDAP to LDAPS, a certificate is required for the secure connection¹². The Certificate Enrollment object in Cisco FTD is used to acquire this certificate³. Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹²³.
Source: Conversation with Bing, 12/11/2023
(1) Configure AD (LDAP) Authentication and User Identity on FTD … - Cisco. https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/216955-configure-ad-ldap-authentication-and-u.html.
(2) How to convert existing LDAP to LDAPS? - Spiceworks Community. https://community.spiceworks.com/topic/2192789-how-to-convert-existing-ldap-to-ldaps.
(3) Firepower AnyConnect LDAP/AD Authentication Issue - Cisco Community. https://community.cisco.com/t5/vpn/firepower-anyconnect-ldap-ad-authentication-issue/td-p/4048922.
(4) Configure Password Management Using LDAPs for RA VPN on FTD … - Cisco. https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client-v4x/220880-configure-password-management-using-ldap.html.
(5) undefined. https://gist.github.com/magnetikonline/0ccdabfec58eb1929c997d22e7341e45.
(6) undefined. https://blogs.msdn.microsoft.com/microsoftrservertigerteam/2017/04/10/step-by-step-guide-to-setup-ld.
A network administrator is configuring an FTD in transparent mode. A bridge group is set up and an access policy has been set up to allow all IP traffic. Traffic is not passing through the FTD. What additional configuration is needed?
A. An IP address must be assigned to the BVI.
B. The security levels of the interfaces must be set.
C. A default route must be added to the FTD.
D. A mac-access control list must be added to allow all MAC addresses.
A. An IP address must be assigned to the BVI.
The additional configuration needed when a network administrator is configuring an FTD in transparent mode and traffic is not passing through the FTD is:
A. An IP address must be assigned to the BVI.
In Transparent Mode, FTD bridges the inside and outside interfaces into a single Layer 2 network and remains transparent to the hosts. When FTD is in Transparent Mode, the FMC does not allow you to assign an IPv4 address to a directly connected interface⁴. As a result, the hosts are unable to communicate with any connected interfaces⁴. Therefore, assigning an IP address to the Bridge Virtual Interface (BVI) is necessary for traffic to pass through the FTD¹²³⁴. Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹²³⁴.
Source: Conversation with Bing, 12/12/2023
(1) Chapter 9 Firepower Deployment in Transparent Mode - Cisco Firepower …. https://www.oreilly.com/library/view/cisco-firepower-threat/9780134679471/ch09.xhtml.
(2) Firepower Threat Defense Transparent Firewall Mode Advanced … - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/215530-firepower-threat-defense-transparent-fir.html.
(3) Solved: Inline FTD device not passing traffic - Cisco Community. https://community.cisco.com/t5/network-security/inline-ftd-device-not-passing-traffic/td-p/4448405.
(4) Transparent or Routed Firewall Mode for Firepower Threat Defense - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-config-guide-v601/fpmc-config-guide-v601_chapter_01101010.pdf.
(5) Firepower Management Center Configuration Guide, Version 6.4 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/transparent_or_routed_firewall_mode_for_firepower_threat_defense.html.
(6) undefined. https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200924-configuring-firepower-threat-defense-int.html.
Refer to the exhibit. A systems administrator conducts a connectivity test to their SCCM server from a host machine and gets no response from the server. Which action ensures that the ping packets reach the destination and that the host receives replies?
A. Configure a custom Snort signature to allow ICMP traffic after inspection.
B. Modify the Snort rules to allow ICMP traffic.
C. Create an access control policy rule that allows ICMP traffic.
D. Create an ICMP allow list and add the ICMP destination to remove it from the implicit deny list.
B. Modify the Snort rules to allow ICMP traffic.
Verified
A security engineer is deploying a pair of primary and secondary Cisco FMC devices. The secondary must also receive updates from Cisco Talos. Which action achieves this goal?
A. Manually import rule updates onto the secondary Cisco FMC device.
B. Force failover for the secondary Cisco FMC to synchronize the rule updates from the primary.
C. Configure the primary Cisco FMC so that the rules are updated.
D. Configure the secondary Cisco FMC so that it receives updates from Cisco Talos.
C. Configure the primary Cisco FMC so that the rules are updated.
Verified
If your deployment includes a high availability pair of FMCs, import the update on the primary only. The secondary FMC receives the rule update as part of the regular synchronization process.
https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/admin/710/management-center-admin-71/system-updates.html#:~:text=currently%20installed%20rules.-,If%20your%20deployment%20includes%20a%20high%20availability%20pair%20of%20FMCs%2C%20import%20the%20update%20on%20the%20primary%20only.%20The%20secondary%20FMC%20receives%20the%20rule%20update%20as%20part%20of%20the%20regular%20synchronization%20process.,-An%20intrusion%20rule
When a Cisco FTD device is configured in transparent firewall mode, on which two interface types can an IP address be configured? (Choose two.)
A. Physical
B. EtherChannel
C. Subinterface
D. BVI
E. Diagnostic
D. BVI
E. Diagnostic
A security engineer needs to configure a network discovery policy on a Cisco FMC appliance and prevent excessive network discovery events from overloading the FMC database? Which action must be taken to accomplish this task?
A. Monitor only the default IPv4 and IPv6 network ranges.
B. Configure NetFlow exporters for monitored networks.
C. Change the network discovery method to TCP/SYN.
D. Exclude load balancers and NAT devices in the policy.
D. Exclude load balancers and NAT devices in the policy.
https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/network_discovery_policies.html
The action that must be taken to prevent excessive network discovery events from overloading the FMC database is:
D. Exclude load balancers and NAT devices in the policy.
Cisco recommends excluding load balancers and NAT devices from monitoring as these devices may create excessive and misleading events, filling the database and overloading the Firepower Management Center¹⁴. Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹²³⁴.
Source: Conversation with Bing, 12/12/2023
(1) Firepower Management Center Configuration Guide, Version 6.1. https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/network_discovery_policies.html.
(2) Network Discovery Policies. https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/discovery-policies.pdf.
(3) Network Discovery Policy - Cisco Secure Firewall. https://secure.cisco.com/secure-firewall/docs/discovery-policy.
(4) Network Discovery Policies. https://www.cisco.com/c/en/us/td/docs/security/firepower/621/configuration/guide/fpmc-config-guide-v621/network_discovery_policies.pdf.
An engineer defines a new rule while configuring an Access Control Policy. After deploying the policy, the rule is not working as expected and the hit counters associated with the rule are showing zero. What is causing this error?
A. An incorrect application signature was used in the rule.
B. The wrong source interface for Snort was selected in the rule.
C. The rule was not enabled after being created.
D. Logging is not enabled for the rule.
A. An incorrect application signature was used in the rule.
Could be A or C, but new rules are enabled by default so “A” makes more sense. AI was not helpful and said it could be any of the 4.
An administrator needs to configure Cisco FMC to send a notification email when a data transfer larger than 10 MB is initiated from an internal host outside of standard business hours. Which Cisco FMC feature must be configured to accomplish this task?
A. file and malware policy
B. application detector
C. correlation policy
D. intrusion policy
C. correlation policy
Verified
Sample Configuration for Excessive BitTorrent Data Transfers
Consider a scenario where you want to generate a correlation event if the system detects excessive BitTorrent data transfers after an initial connection to any host on your monitored network.
The following graphic shows a correlation rule that triggers when the system detects the BitTorrent application protocol on your monitored network. The rule has a connection tracker that constrains the rule so that the rule triggers only if hosts on your monitored network (in this example, 10.1.0.0/16) collectively transfer more than 7MB of data (7340032 bytes) via BitTorrent in the five minutes following the initial policy violation.
https://www.cisco.com/c/en/us/td/docs/security/firepower/621/configuration/guide/fpmc-config-guide-v621/correlation_policies.html#ID-2204-00000ca6:~:text=stops%20tracking%20connections.-,Sample%20Configuration%20for%20Excessive%20BitTorrent%20Data%20Transfers,-Consider%20a%20scenario
Which process should be checked when troubleshooting registration issues between Cisco FMC and managed devices to verify that secure communication is occurring?
A. fpcollect
B. dhclient
C. sfrmgr
D. sftunnel
D. sftunnel
Verified
The process that should be checked when troubleshooting registration issues between Cisco FMC and managed devices to verify that secure communication is occurring is:
D. sftunnel
The sftunnel process is used for the secure connection between a managed FTD and the managed FMC¹. If there are registration issues, checking the status and functionality of the sftunnel process can help identify and resolve the problem¹. Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹.
Source: Conversation with Bing, 12/14/2023
(1) Configure, Verify, and Troubleshoot Firepower Device Registration - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/215540-configure-verify-and-troubleshoot-firep.html.
(2) Use FMC and FTD Smart License Registration and Common Issues to … - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/215838-fmc-and-ftd-smart-license-registration-a.html.
(3) Restored FMC from backup. Can’t see or deploy to devices?. https://community.cisco.com/t5/network-security/restored-fmc-from-backup-can-t-see-or-deploy-to-devices/td-p/4762177.
A security engineer must integrate an external feed containing STIX/TAXII data with Cisco FMC. Which feature must be enabled on the Cisco FMC to support this connection?
A. Threat Intelligence Director
B. Cisco Success Network
C. Security Intelligence Feeds
D. Cisco Secure Endpoint Integration
A. Threat Intelligence Director
Verified
The correct answer is A. To integrate an external feed containing STIX/TAXII data with Cisco FMC, the Threat Intelligence Director feature must be enabled.
The Threat Intelligence Director is a feature of Cisco FMC that allows for the integration of external threat intelligence feeds, including those that use STIX/TAXII. The Threat Intelligence Director allows the Cisco FMC to receive threat intelligence data from external sources and use that data to inform security policies and block malicious traffic.
The feature that must be enabled on the Cisco FMC to support the integration of an external feed containing STIX/TAXII data is:
A. Threat Intelligence Director
The Threat Intelligence Director (TID) in Cisco FMC operationalizes threat intelligence data, helping you aggregate intelligence data, configure defensive actions, and analyze threats in your environment¹. TID supports other ingestion parameters such as STIX and TAXII³. Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹³.
Source: Conversation with Bing, 12/14/2023
(1) Firepower Management Center Device Configuration Guide, 7.1 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/710/management-center-device-config-71/threat-intelligence-director.html.
(2) Third-Party Integration of Security Feeds with FMC (Cisco Threat …. https://community.cisco.com/t5/security-blogs/third-party-integration-of-security-feeds-with-fmc-cisco-threat/ba-p/3905840.
(3) Firepower Security Intelligence with third party free TAXII feeds. https://community.cisco.com/t5/integrated-security-platform/firepower-security-intelligence-with-third-party-free-taxii/td-p/4192811.
(4) Securing Networks with Cisco Firepower (SNCF) - VCEdump. https://www.vcedump.com/exam/300-710.html.
(5) undefined. http://hailataxii.com/.
An engineer is configuring two new Cisco FTD devices to replace the existing high availability firewall pair in a highly secure environment. The information exchanged between the FTD devices over the failover link must be encrypted. Which protocol supports this on the Cisco FTD?
A. MACsec
B. IPsec
C. SSH
D. SSL
B. IPsec
The protocol that supports encrypted information exchange between Cisco FTD devices over the failover link is:
B. IPsec
By default, the communications on the failover and stateful failover links are plain text (unencrypted). However, you can enhance security by configuring an IPsec encryption key to encrypt these communications¹. Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹.
Source: Conversation with Bing, 12/14/2023
(1) Cisco Firepower Threat Defense Configuration Guide for Firepower Device …. https://www.cisco.com/c/en/us/td/docs/security/firepower/630/fdm/fptd-fdm-config-guide-630/fptd-fdm-ha.html.
(2) Configure FTD High Availability on Firepower Appliances - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212699-configure-ftd-high-availability-on-firep.html.
(3) Solved: Supported encryption in FTD 6.7.0 - Cisco Community. https://community.cisco.com/t5/vpn/supported-encryption-in-ftd-6-7-0/td-p/4445577.
(4) Cisco Content Hub - SGT Exchange Protocol over TCP (SXP). https://content.cisco.com/chapter.sjs?uri=%2Fsearchable%2Fchapter%2Fwww.cisco.com%2Fcontent%2Fen%2Fus%2Ftd%2Fdocs%2Fswitches%2Flan%2Ftrustsec%2Fconfiguration%2Fguide%2Ftrustsec%2Fsxp_config.html.xml&platform=Cisco%20Catalyst%204900%20Series%20Switches&release=IOS%20XE%203E.
(5) undefined. https://www.cisco.com/c/en/us/td/docs/security/firepower/670/configuration/guide/fpmc-config-guide-v67/vpn_overview.html.
A security engineer must configure policies for a recently deployed Cisco FTD. The security policy for the company dictates that when five or more connections from external sources are initiated within 2 minutes, there is cause for concern. Which type of policy must be configured in Cisco FMC to generate an alert when this condition is triggered?
A. application detector
B. access control
C. correlation
D. intrusion
C. correlation
Verified
The correct answer is C. correlation. A correlation policy can be configured in the Cisco Firepower Management Center (FMC) to generate an alert when a specific condition is triggered. Correlation policies allow you to define rules that specify the conditions under which the system should generate an alert, and the actions that the system should take when those conditions are met. In this case, a correlation rule can be created to generate an alert when five or more connections from external sources are initiated within 2 minutes
The type of policy that must be configured in Cisco FMC to generate an alert when this condition is triggered is:
C. Correlation Policy
A correlation policy allows you to define the conditions under which the system should generate an alert¹. These conditions can include a variety of factors, such as the detection of specific types of traffic or activities, and can be fine-tuned to occur during specific time periods¹. Therefore, a correlation policy can be configured to send a notification email when a data transfer larger than 10 MB is initiated from an internal host outside of standard business hours¹. Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹.
Source: Conversation with Bing, 12/14/2023
(1) Firepower Management Center Configuration Guide, Version 6.5 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/650/configuration/guide/fpmc-config-guide-v65/external_alerting_with_alert_responses.html.
(2) Cisco FMC critical and major email alert - Cisco Community. https://community.cisco.com/t5/network-security/cisco-fmc-critical-and-major-email-alert/td-p/4083838.
(3) Solved: FMC IPS Critical Alert - Cisco Community. https://community.cisco.com/t5/network-security/fmc-ips-critical-alert/td-p/4083902.
(4) undefined. https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/fpmc-config-guide-v60_chapter_01110000.html.
(5) undefined. https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/external_alerting_for_intrusion_events.pdf.
A consultant is working on a project where the customer is upgrading from a single Cisco Firepower 2130 managed by FDM to a pair of Cisco Firepower 2130s managed by FMC for high availability. The customer wants the configuration of the existing device being managed by FDM to be carried over to FMC and then replicated to the additional device being added to create the high availability pair. Which action must the consultant take to meet this requirement?
A. The current FDM configuration must be configured by hand into FMC before the devices are registered.
B. The current FDM configuration must be migrated to FMC using the Secure Firewall Migration Tool.
C. The FTD configuration must be converted to ASA command format, which can then be migrated to FMC.
D. The current FDM configuration will be converted automatically into FMC when the device registers.
The action that the consultant must take to meet this requirement is:
A. The current FDM configuration must be configured by hand into FMC before the devices are registered.
Currently, Cisco does not have any option to migrate FDM firepower configuration to an FMC and vice-versa¹. Therefore, the existing configuration on the device managed by FDM must be manually configured into FMC before the devices are registered¹. Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹.
Source: Conversation with Bing, 12/14/2023
(1) Configure FDM On-Box Management Service for Firepower 2100 - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-2100-series/213519-configure-fdm-firepower-device-manageme.html.
(2) Cisco Firepower 2100 Series - Configuration Guides - Cisco. https://www.cisco.com/c/en/us/support/security/firepower-2100-series/products-installation-and-configuration-guides-list.html.
(3) Adding new Firepower 2130 Series to Firepower Management Center - Cisco …. https://community.cisco.com/t5/network-security/adding-new-firepower-2130-series-to-firepower-management-center/td-p/4409623.
(4) Cisco Firepower Threat Defense Configuration Guide for Firepower Device …. https://www.cisco.com/c/en/us/td/docs/security/firepower/630/fdm/fptd-fdm-config-guide-630/fptd-fdm-ha.html.
(5) Firepower Management Center Configuration Guide, Version 6.2 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_management_center_high_availability.html.
https://www.cisco.com/c/en/us/support/docs/security/firepower-2100-series/213519-configure-fdm-firepower-device-manageme.html#:~:text=Caution%3A%20Right%20now%20Cisco%20does%20not%20have%20any%20option%20to%20migrate%20FDM%20firepower%20configuration%20to%20an%20FMC%20and%20vice%2Dversa%2C%20take%20this%20into%20consideration%20when%20you%20choose%20what%20type%20of%20management%20you%20configure%20for%20the%20FTD%20installed%20in%20the%20firepower%202100.
A network administrator must create an EtherChannel interface on a new Cisco Firepower 9300 appliance registered with an FMC for high availability. Where must the administrator create the EtherChannel interface?
A. FMC GUI
B. FMC CLI
C. FTD CLI
D. FXOS CLI
D. FXOS CLI
Verified
I was wrong, according to the link below the provided answer is correct, so D:
“The Firepower 4100/9300 manages the basic Ethernet settings of physical interfaces, VLAN subinterfaces for container instances, and EtherChannel (port-channel) interfaces. Within the application, you configure higher level settings. For example, you can only create EtherChannels in FXOS; but you can assign an IP address to the EtherChannel within the application.”
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/fxos/fxos281/cli-guide/b_CLI_ConfigGuide_FXOS_281/interface_management.html
The administrator must create the EtherChannel interface at:
D. FXOS CLI
On Firepower 4100 and 9300 series devices, EtherChannel interfaces are created using the Firepower Chassis Manager (FCM) or the Firepower eXtensible Operating System (FXOS) CLI¹⁴. Once created, they can be assigned to and used by the Firepower Threat Defense (FTD) logical devices running on that hardware⁴. Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹⁴.
Source: Conversation with Bing, 12/15/2023
(1) Configure and Verify Port-Channel on Firepower Appliances - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/215351-configure-verify-and-troubleshoot-port.html.
(2) FMC 4600 Version 6.7.0 Etherchannel Configuration - Cisco Community. https://community.cisco.com/t5/network-security/fmc-4600-version-6-7-0-etherchannel-configuration/td-p/4258317.
(3) Solved: Etherchannel(LACP) configuration in Firepower(FTD w/ FMC …. https://community.cisco.com/t5/network-security/etherchannel-lacp-configuration-in-firepower-ftd-w-fmc-inline/td-p/4640700.
(4) Configure FTD High Availability on Firepower Appliances - Cisco. https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/212699-configure-ftd-high-availability-on-firep.html.
A network administrator is reviewing a monthly advanced malware risk report and notices a host that is listed as CnC Connected. Where must the administrator look within Cisco FMC to further determine if this host is infected with malware?
A. Analysis > Hosts > Indications of Compromise
B. Analysis > Hosts > Host Attributes
C. Analysis > Files > Malware Events
D. Analysis > Files > Network File Trajectory
A. Analysis > Hosts > Indications of Compromise
Verified
The administrator should look at:
A. Analysis > Hosts > Indications of Compromise
The “Indications of Compromise” feature in Cisco FMC provides alerts if individual hosts show signs of compromise from unknown attacks⁴. This can help the administrator to further determine if the host is infected with malware⁴. Please note that the specific configuration may vary depending on the network environment and security requirements. Always refer to the official Cisco documentation or consult with a network security professional when configuring network appliances¹²³⁴.
Source: Conversation with Bing, 12/15/2023
(1) Cisco Secure Firewall Management Center (formerly Firepower Management …. https://www.cisco.com/c/en/us/products/collateral/security/firesight-management-center/datasheet-c78-736775.html.
(2) Solved: 25 Compromise host-FTD/FMC - Cisco Community. https://community.cisco.com/t5/network-security/25-compromise-host-ftd-fmc/td-p/4403164.
(3) Firepower Management Center Configuration Guide, Version 6.2.3 - Cisco. https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/file_policies_and_advanced_malware_protection.html.
(4) Malware and File Policy - Cisco Secure Firewall. https://secure.cisco.com/secure-firewall/docs/malware-and-file-policy.
(5) Solved: The host may be under remote control - Cisco Community. https://community.cisco.com/t5/network-security/the-host-may-be-under-remote-control/td-p/3203315.
Also verified here:
https://community.cisco.com/t5/network-security/hosts-indications-of-compromise/td-p/2982680#:~:text=Analysis%3EHosts%3EIndications%20of%20Compromise