Test #1 Flashcards
(310 cards)
Which CLI command is used to control special handling of ClientHello messages?
A. system support ssl-client-hello-tuning
B. system support ssl-client-hello-display
C. system support ssl-client-hello-force-reset
D. system support ssl-client-hello-reset
A
Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?
A. configure high-availability resume
B. configure high-availability disable
C. system support network-options
D. configure high-availability suspend
D
Which command must be run to generate troubleshooting files on an FTD?
A. system support view-files
B. sudo sf_trobleshoot.pl
C. system generate-troubleshoot all
D. show tech-support
C
When do you need the file-size command option during troubleshooting with packet capture?
A. when capture packets are less than 16 MB
B. when capture packets are restricted from the secondary memory.
C. when capture packets exceed 10 GM
D. when capture packets exceed 32 MB
D
What is the functionality of port objects in Cisco FMC?
A. to mix transport protocols when setting both source and destination port conditions in a rule.
B. to represent protocols other than TCP, UDP, and ICMP
C. to represent all protocols in the same way.
D. to add any protocol other than TCP and UDP for source port conditions in access control rules.
B
Within Cisco FMC, where does a user add or modify widgets?
A. dashboard
b. reporting
c. context explorer
d. summary tool
A
A network engineer is configuring URL filtering on FTD. Which two port requirements on the FMC must be validated to allow communication with the cloud service?
a. outbound TCP/443
b. inbound TCP/80
C. outbound TCP/8080
d. inbound TCP/443
e. outbound TCP/80
A E
What is the maximum bit size that Cisco FMC supports for HTTPS certificates?
a. 1024
b. 8192
c. 4096
d. 2048
C
Which limitation applies to Cisco FMC dashboards in a multidomain environment?
A. Child domains can view but not edit dashboards that originate from an ancestor domain.
b. Child domains have access to only a limited set of widgets from ancestor domains.
c. only the administrator of the top ancestor domain can view dashbaords.
d. child domains cannot view dashboards that originate from an ancestor domain.
D
An engineer is troubleshooting a file that is being blocked by a Cisco FTD device on the network. The user is reporting that the file is not malicious. Which action does the engineer take to identify the file and validate whether or not it is malicious?
A. Identify the file in the intrusion events and submit it to the Threat Grid for analysis.
B. Use FMC file analysis to look for the file and select Analyze to determine its disposition.
C. Use the context explorer to find the file and download it to the local machine for investigation.
D. Right click the connection event and send the file to AMP for Endpoints to see if the hash is malicious.
A
What is a behavior of a Cisco FMC database purge?
A. User login and history data are removed from the database if the User Activity check box is not selected.
B. Data can be recovered from the device.
C. The appropriate process is restarted.
D. The specified data is removed from FMC and kept for 2 weeks.
C
Which two packet captures does the FTD LINA engine support? (Choose two)
A. Layer 7 network ID
B. source IP
C. application ID
D. dynamic firewall importing
E. protocol
BE
Which two features of Cisco AMP allows for an uploaded file to be blocked? (Choose two)
A. application blocking
b. simple custom detection
c. file repository
d. exclusions
e. application whitelisting
AB
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?
A. Add the malicious file to the block list.
B. Send a snapshot to Cisco for technical support.
C. Forward the result of the investigation to an external threat-analysis engine.
D. Wait for Cisco Threat Response to automatically block the malware.
A
Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?
A. Windows domain controller
B. audit
C. triage
D. protection
B.
What is a valid Cisco AMP file disposition?
A. non-malicious
B. malware
C. known-good
D. pristine
B
In a Cisco AMP deployment, which disposition is returned if the cloud cannot be reached?
a. unavailable
b. unknown
c. clean
d. disconnected
A
Which two remediation options are available when Cisco FMC is integrated with Cisco ISE? (Choose Two)
A. dynamic null route configured
b. DHCP pool disablement
c. quarantine
d. port shutdown
e. host shutdown
CD
Which connector is used to integrate Cisco ISE with Cisco FMC for Rapid Threat Containment?
a. pxGrid
b. FTD RTC
c. FMC RTC
d. IseGrid
A
What is the maximum SHA level of filtering that Threat Intelligence Director supports?
a. SHA-1024
b. SHA-4096
c. SHA-512
d. SHA-256
D
(D&D) Steps to restore an automatic device registration failure on the standby Cisco FMC.
- Enter the ‘configure manager add’ command at the CLI of the affected device
- Unregister the device from the standy Cisco FMC
- Register the affected device on the active Cisco FMC.
- Enter the ‘configure manager delete’ command at the CLI of teh affected device.
- Register the affected device on the standby Cisco FMC
- Unregister the device from the active Cisco FMC
- Unregister the device from the active Cisco FMC
- Enter the ‘configure manager delete’
- Enter the ‘configure manager add’
- Register the affected device on the active FMC.
Which protocol is needed to exchange threat details in rapid threat containment on Cisco FMC?
A. SGT
B. SNMP v3
C. BFD
D. pxGrid
D
Which description of a correlation policy configuration in teh Cisco FMC is true?
A. The system displays correlation policies that are created on all of the domains in a multidomain deployment.
B. Deleting a response group deletes the responses of that group.
C. You cannot add a host profile qualification to a correlation rule that is triggered by a malware event.
D. Correlation policy priorities whitelist priorities.
C
What is the result of enabling Cisco FTD clustering?
A. For the dynamic routing feature, if the master unit fails, the newly elected master unit maintains all existing connections.
B. Integrated Routing and Bridging is supposed on the master unit.
C. Site-to-Site VPN functionality is limited to the master unit, and all VPN connections are dropped if the master unit fails.
D. All Firepower appliances can support FTD clustering.
C