Which piece of information is required to perform a policy trace for the Cisco WSA?
A.
the destination IP address of the trace
B.
the source IP address of the trace
C.
the URL to trace
D.
authentication credentials to make the request
Which piece of information is required to perform a policy trace for the Cisco WSA?
Which piece of information is required to perform a policy trace for the Cisco WSA?
A.
the destination IP address of the trace
B.
the source IP address of the trace
C.
the URL to trace
D.
authentication credentials to make the request
QUESTION 53
With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes the appliance?
A. transparent
B. routed
C. passive
D. inline set
E. inline tap
Answer: C
QUESTION 54
Which three routing options are valid with Cisco FirePOWER version 5.4? (Choose three.)
A. Layer 3 routing with EIGRP
B. Layer 3 routing with OSPF not-so-stubby area
C. Layer 3 routing with RiPv2
D. Layer 3 routing with RIPv1
E. Layer 3 routing with OSPF stub area
F. Layer 3 routing with static routes
Answer: DEF
QUESTION 55
Which website can be used to validate group information about connections that flow through Cisco CWS?
A. whoami.scansafe.com
B. policytrace.scansafe.com
C. policytrace.scansafe.net
D. whoami.scansafe.net
Answer: C
QUESTION 56
Which three statements about Cisco CWS are true’? (Choose three)
A. It provides protection against zero-day threats.
B. Cisco 510 provides it with threat updates in near real time.
C. It supports granular application policies.
D. Its Roaming User Protection feature protects the VPN from malware and data breaches.
E. It supports local content caching.
F. Its Cognitive Threat Analytics feature uses cloud-based analysis and detection to block threats outside the network.
Answer: ABC
QUESTION 57
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data within a network perimeter?
A. cloud web services
B. network AMP
C. private cloud
D. public cloud
Answer: C
QUESTION 58
Which type of policy do you configure if you want to look for a combination of events using Boolean logic?
A. correlation
B. application detector
C. traffic profile
D. access control
E. intrusion
Answer: A
QUESTION 59
Which interface type allows packets to be dropped?
A. passive
B. inline
C. TAP
D. either passive or inline, provided that the intrusion policy has the Drop When lnline check box selected.
Answer: D
QUESTION 60
Which Cisco Firepower rule action displays a HTTP warning page and resets the connection of HTTP traffic specified in the access control rule ?
A. Interactive Block with Reset
B. Block
C. Allow with Warning
D. Interactive Block
Answer: C
QUESTION 61
With Cisco AMP for Endpoints on Windows, which three engines are available in the connector? (Choose three)
A. Ethos
B. Tetra
C. Annas
D. Spero
E. Talos
F. ClamAV
Answer: ABD
QUESTION 62
Refer to the exhibit. Which option is a result of this configuration?
A. All ingress traffic on the inside interface that matches the access list is redirected.
B. All egress traffic on the outside interface that matches the access list is redirected.
C. All TCP traffic that arrives on the inside interface is redirected.
D. All ingress and egress traffic is redirected to the Cisco FirePOWER module.
Answer: D
QUESTION 63
What are two requirements for configuring a hybrid interface in FirePOWER? (Choose two)
A. virtual network
B. virtual router
C. virtual appliance
D. virtual switch
E. virtual context
Answer: AD
MORE NEW 300-210 Added Questions: https://drive.google.com/drive/folders/0B75b5xYLjSSNUm03a0t2blYySEU?usp=sharing