A Cisco Secure Firewall Threat Defense device is configured in inline IPS mode to inspect all traffic that passes through the interfaces in the inline set. Which setting in the inline set configuration must be selected to allow traffic to pass through uninterrupted when VDB updates are being applied?
A. Tap Mode
B. Strict TCP Enforcement
C. Propagate Link State
D. Snort Fail Open
Which two features can be used with Cisco Secure Firewall Threat Defense remote access VPN? (Choose two.)
A. enable Duo two-factor authentication using LDAPS
B. support for Cisco Secure Firewall 4100 Series in cluster mode
C. SSL remote access VPN supports port sharing with other Cisco FTD features using SSL port 443
D. use of license utilization for zero-touch network deployment
E. support for Rapid Threat Containment using RADIUS dynamic authorization
Remote users who connect via Cisco Secure Client to the corporate network behind a Cisco Secure Firewall Threat Defense device are reporting no audio on calls when calling between remote users using their softphones. These same users can call internal users on the corporate network without any issues. What is the cause of this issue?
A. The hairpinning feature is not available on Cisco Secure Firewall Threat Defense
B. Cisco Secure Firewall Threat Defense needs a NAT policy that allows outside to outside communication
C. The Enable Spoke to Spoke Connectivity through Hub option is not selected on Cisco Secure Firewall Threat Defense
D. Split tunneling is enabled for the Remote Access VPN on Cisco Secure Firewall Threat Defense
An administrator is configuring the interface of a Cisco Secure Firewall Threat Defense firewall device in a passive IPS deployment. The device and interface have been identified. Which set of configuration steps must the administrator perform next to complete the implementation?
A. Set the interface mode to passive. Associate the interface with a security zone. Enable the interface. Set the MTU parameter.
B. Modify the interface to retransmit received traffic. Associate the interface with a security zone Set the MTU parameter
C. Set the interface mode to passive. Associate the interface with a security zone. Set the MTU parameter. Reset the interface.
D. Modify the interface to retransmit received traffic. Associate the interface with a security zone. Enable the interface. Set the MTU parameter.
What is the result when two users modify a VPN policy at the same time on a Cisco Secure Firewall Management Center managed device?
A. Both users can edit the policy and the last saved configuration persists.
B. The changes from both users will be merged together into the policy.
C. The first user locks the configuration when selecting edit on the policy.
D. The system prevents modifications to the policy by multiple users.
A network administrator is configuring a BVI interface on a routed FTD. The administrator wants to isolate traffic on the interfaces connected to the bridge group and not have the FTD route this traffic using the routing table. What must be configured?
A. A new VRF must be created for the BVI interface
B. An IP address must be configured on the BVI
C. IP routing must be removed from the physical interfaces connected to the BVI
D. The BVI interface must be configured for transparent mode
Which file format can standard reports from Cisco Secure Firewall Management Center be downloaded in?
A. doc
B. ppt
C. csv
D. xls
Encrypted Visibility Engine (EVE) is enabled under which tab on an access control policy in Cisco Secure Firewall Management Center?
A. Network Analysis Policy
B. SSL
C. Advanced
D. Security Intelligence
An engineer is configuring a Cisco Secure Firewall Threat Defense device managed by Cisco Secure Firewall Management Center. The device must have SSH enabled and be accessible from the inside interface for remote administration. Which type of policy must the engineer configure to accomplish this?
A. platform settings
B. access control
C. prefilter
D. identity
A network engineer is deploying a pair of Cisco Secure Firewall Threat Defense devices managed by Cisco Secure Firewall Management Center for High Availability. Internet access is a high priority for the business and therefore they have invested in internet circuits from two different ISPs. The requirement from the customer is that internet access must be available to their users even if one of the ISPs is down. Which two features must be deployed to achieve this requirement? (Choose two.)
A. Route Tracking
B. Redundant interfaces
C. EtherChannel interfaces
D. SLA Monitor
E. BGP
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 300-710 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.