A network administrator registered a new FTD to an existing FMC. The administrator cannot place the FTD in transparent mode. Which action enables transparent mode?
A. Deregister the FTD device from FMC and configure transparent mode via the CLI.
B. Obtain an FTD model that supports transparent mode.
C. Add a Bridge Group Interface to the FTD before transparent mode is configured.
D. Assign an IP address to two physical interfaces.
A network engineer must provide redundancy between two Cisco FTD devices. The redundancy configuration must include automatic configuration, translation, and connection updates. After the initial configuration of the two appliances, which two steps must be taken to proceed with the redundancy configuration? (Choose two.)
A. Configure the virtual MAC address on the failover link.
B. Configure the failover link with stateful properties.
C. Disable hellos on the inside interface.
D. Ensure the high availability license is enabled.
E. Configure the standby IP addresses.
An administrator is attempting to add a new FTD device to their FMC behind a NAT device with a NAT ID of NAT001 and a password of Cisco0123456789. The private IP address of the FMC server is 192.168.45.45, which is being translated to the public IP address of 209.165.200.225/27. Which command set must be used in order to accomplish this task?
A. configure manager add 209.165.200.225 255.255.255.224
B. configure manager add 209.165.200.225
C. configure manager add 209.165.200.225/27
D. configure manager add 192.168.45.45
Which feature is supported by IRB on Cisco FTD devices?
A. redundant interface
B. high-availability cluster
C. dynamic routing protocol
D. EtherChannel interface
A security analyst must create a new report within Cisco FMC to show an overview of the daily attacks, vulnerabilities, and connections. The analyst wants to reuse specific dashboards from other reports to create this consolidated one. Which action accomplishes this task?
A. Copy the Malware Report and modify the sections to pull components from other reports.
B. Create a new dashboard object via Object Management to represent the desired views.
C. Use the import feature in the newly created report to select which dashboards to add.
D. Modify the Custom Workflows within the Cisco FMC to feed the desired data into the new report.
A network administrator is trying to convert from LDAP to LDAPS for VPN user authentication on a Cisco FTD. Which action must be taken on the Cisco FTD objects to accomplish this task?
A. Identify the LDAPS cipher suite and use a Cipher Suite List object to define the Cisco FTD connection requirements.
B. Modify the Policy List object to define the session requirements for LDAPS.
C. Add a Key Chain object to acquire the LDAPS certificate.
D. Create a Certificate Enrollment object to get the LDAPS certificate needed.
A network administrator is configuring an FTD in transparent mode. A bridge group is set up and an access policy has been set up to allow all IP traffic. Traffic is not passing through the FTD. What additional configuration is needed?
A. An IP address must be assigned to the BVI.
B. The security levels of the interfaces must be set.
C. A default route must be added to the FTD.
D. A mac-access control list must be added to allow all MAC addresses.
The network administrator wants to enhance the network security posture by enabling machine learning for malware detection due to a concern with suspicious Microsoft executable file types that were seen while creating monthly security reports for the CIO. Which feature must be enabled to accomplish this goal?
A. Ethos
B. static analysis
C. Spero
D. dynamic analysis
What is the RTC workflow when the infected endpoint is identified?
A. Cisco ISE instructs Cisco AMP to contain the infected endpoint.
B. Cisco ISE instructs Cisco FMC to contain the infected endpoint.
C. Cisco FMC instructs Cisco ISE to contain the infected endpoint.
D. Cisco AMP instructs Cisco FMC to contain the infected endpoint.
A network administrator is configuring a Cisco AMP public cloud instance and wants to capture infections and polymorphic variants of a threat to help detect families of malware. Which detection engine meets this requirement?
A. Ethos
B. Tetra
C. RBAC
D. Spero
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 300-710 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.