PrepAway - Latest Free Exam Questions & Answers

Which three access control actions permit traffic to pa…

Which three access control actions permit traffic to pass through the device when usingCisco FirePOWER? (Choose three.)

PrepAway - Latest Free Exam Questions & Answers

A.
pass

B.
trust

C.
monitor

D.
allow

E.
permit

F.
inspect

3 Comments on “Which three access control actions permit traffic to pa…

  1. Elsa says:

    2017 new 300-210 exam questions updated today!

    QUESTION 56
    Which three statements about Cisco CWS are true’? (Choose three)

    A. It provides protection against zero-day threats.
    B. Cisco 510 provides it with threat updates in near real time.
    C. It supports granular application policies.
    D. Its Roaming User Protection feature protects the VPN from malware and data breaches.
    E. It supports local content caching.
    F. Its Cognitive Threat Analytics feature uses cloud-based analysis and detection to block threats outside the network.

    Answer: ABC

    QUESTION 57
    Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data within a network perimeter?

    A. cloud web services
    B. network AMP
    C. private cloud
    D. public cloud

    Answer: C

    QUESTION 58
    Which type of policy do you configure if you want to look for a combination of events using Boolean logic?

    A. correlation
    B. application detector
    C. traffic profile
    D. access control
    E. intrusion

    Answer: A

    QUESTION 59
    Which interface type allows packets to be dropped?

    A. passive
    B. inline
    C. TAP
    D. either passive or inline, provided that the intrusion policy has the Drop When lnline check box selected.

    Answer: D

    QUESTION 60
    Which Cisco Firepower rule action displays a HTTP warning page and resets the connection of HTTP traffic specified in the access control rule ?

    A. Interactive Block with Reset
    B. Block
    C. Allow with Warning
    D. Interactive Block

    Answer: C

    QUESTION 61
    With Cisco AMP for Endpoints on Windows, which three engines are available in the connector? (Choose three)

    A. Ethos
    B. Tetra
    C. Annas
    D. Spero
    E. Talos
    F. ClamAV

    Answer: ABD

    QUESTION 62
    Refer to the exhibit. Which option is a result of this configuration?

    A. All ingress traffic on the inside interface that matches the access list is redirected.
    B. All egress traffic on the outside interface that matches the access list is redirected.
    C. All TCP traffic that arrives on the inside interface is redirected.
    D. All ingress and egress traffic is redirected to the Cisco FirePOWER module.

    Answer: D

    QUESTION 63
    What are two requirements for configuring a hybrid interface in FirePOWER? (Choose two)

    A. virtual network
    B. virtual router
    C. virtual appliance
    D. virtual switch
    E. virtual context

    Answer: AD

    QUESTION 64
    Which type of policy is used to define the scope for applications that are running on hosts?

    A. access control policy.
    B. application awareness policy.
    C. application detector policy.
    D. network discovery policy.

    Answer: B

    QUESTION 65
    When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.)

    A. rootkit detection
    B. spam scanning
    C. APT detection
    D. antivirus scanning
    E. URL filtering

    Answer: BD

    more new 300-210 exam questions from:https://www.braindump2go.com/300-210.html (new 300-210 pdf and vce dumps 318q&as dumps update on Aug 2, 2017), covers all new questions in step with the offcial test center




    0



    0
  2. Lenia says:

    More new Cisco 300-210 Questions:

    QUESTION
    Which Cisco AMP for Endpoints, what, is meant by simple custom detection?

    A. It is a rule for identifying a file that should be whitelisted by Cisco AMP.
    B. It is a method for identifying and quarantining a specific file by its SHA-256 hash.
    C. It is a feature for configuring a personal firewall.
    D. It is a method for identifying and quarantining a set of files by regular expression language.

    Answer: B

    QUESTION
    Which feature of the Cisco Hybrid Email Security services enables you to create multiple email senders on a single Cisco ESA?

    A. Email Marketing Connector
    B. Virtual Routing and Forwarding
    C. Virtual Gateway
    D. Mail Flow Policy Connector
    E. Sender Groups

    Answer: C

    QUESTION
    Which option lists the minimum requirements to deploy a managed device inline?

    A. passive interface, security zone, MTU, and link mode.
    B. passive interface, MTU, MDI/MDIX, and link mode.
    C. inline interfaces, MTU, MDI/MDIX, and link mode.
    D. inline interfaces, security zones, MTU, and link mode.

    Answer: A

    QUESTION
    Which two methods are used to deploy transparent mode traffic redirection? (Choose two)

    A. Microsoft GPO
    B. policy-based routing
    C. DHCP server
    D. PAC files
    E. Web Cache Communication Protocol

    Answer: BE

    QUESTION
    When deploying Cisco FirePOWER appliances, which option must you configure to enable VLAN rewriting?

    A. hybrid interfaces
    B. virtual switch
    C. virtual router
    D. inline set

    Answer: B

    QUESTION
    Which policy must you edit to make changes to the Snort preprocessors?

    A. access control policy
    B. network discovery policy
    C. intrusion policy
    D. file policy
    E. network analysis policy

    Answer: A

    QUESTION
    Which three access control actions permit traffic to pass through the device when using Cisco FirePOWER? (Choose three.)

    A. pass
    B. trust
    C. monitor
    D. allow
    E. permit
    F. inspect

    Answer: BCD

    QUESTION
    Which two TCP ports can allow the Cisco Firepower Management Center to communication with FireAMP cloud for file disposition information? (Choose two.)

    A. 8080
    B. 22
    C. 8305
    D. 32137
    E. 443

    Answer: DE

    QUESTION
    When creating an SSL policy on Cisco FirePOWER, which three options do you have?

    A. do not decrypt
    B. trust
    C. allow
    D. block with reset
    E. block
    F. encrypt

    Answer: ADE

    QUESTION
    Which three operating systems are supported with Cisco AMP for Endpoints? (Choose three.)

    A. Windows
    B. AWS
    C. Android
    D. Cisco lOS
    E. OSX
    F. ChromeOS

    Answer: ACE

    QUESTION
    Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?

    A. explicit forward mode
    B. Layer 4Traffic Monitor
    C. transparent mode
    D. Secure Web Proxy

    Answer: B




    0



    0

Leave a Reply