Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

When do you need the file-size command option during troubleshooting with packet capture?

A.

when capture packets are less than 16 MB

B.

when capture packets are restricted from the secondary memory

C.

when capture packets exceed 10 GB

D.

when capture packets exceed 32 MB

An analyst is investigating a potentially compromised endpoint within the network and pulls a host report for the endpoint in question to collect metrics and documentation. What information should be taken from this report for the investigation?

A.

client applications by user, web applications, and user connections

B.

number of attacked machines, sources of the attack, and traffic patterns

C.

intrusion events, host connections, and user sessions

D.

threat detections over time and application protocols transferring malware

What is a method used by Cisco Rapid Threat Containment to contain the threat in the network?

A.

change of authentication

B.

share context data

C.

TACACS+

D.

trustsec segmentation

An engineer is configuring a Cisco IPS to protect the network and wants to test a policy before deploying it. A copy of each incoming packet needs to be monitored while traffic flow remains constant. Which IPS mode should be implemented to meet these requirements?

A.

Inline tap

B.

passive

C.

transparent

D.

routed

Which component is needed to perform rapid threat containment with Cisco FMC?

A.

ISE

B.

RESTful API

C.

SIEM

D.

DDI

Network users are experiencing Intermittent issues with internet access. An engineer ident med mat the issue Is being caused by NAT exhaustion. How must the engineer change the dynamic NAT configuration to provide internet access for more users without running out of resources?

A.

Define an additional static NAT for the network object in use.

B.

Configure fallthrough to interface PAT on 'he Advanced tab.

C.

Convert the dynamic auto NAT rule to dynamic manual NAT.

D.

Add an identity NAT rule to handle the overflow of users.

A network administrator must create an EtherChannel Interface on a new Cisco Firepower 9300 appliance registered with an FMC tor high availability. Where must the administrator create the EtherChannel interface?

A.

FMC CLI

B.

FTD CLI

C.

FXOS CLI

D.

FMC GUI

An engineer is troubleshooting the upgrade of a Cisco Secure Firewall Threat Defense device on the Secure Firewall Management Center 7.0 GUI. The engineer wants to collect the upgrade data and logs. Which two actions must the engineer take? (Choose two.)

A.

View the system and troubleshooting details.

B.

Select the Secure Firewall Threat Defense device properties.

C.

Select the Secure Firewall Management Center device.

D.

Access the Health Events page.

E.

Access the Health Monitor page.

An administrator is adding a new URL-based category feed to the Cisco FMC for use within the policies. The intelligence source does not use STIX. but instead uses a .txt file format. Which action ensures that regular updates are provided?

A.

Add a URL source and select the flat file type within Cisco FMC.

B.

Upload the .txt file and configure automatic updates using the embedded URL.

C.

Add a TAXII feed source and input the URL for the feed.

D.

Convert the .txt file to STIX and upload it to the Cisco FMC.

An engineer is configuring Cisco Secure Firewall Threat Defense managed by a Secure Firewall Management Center appliance. The company wants remote access VPN users to be reachable from the inside network. What must the engineer configure to meet the requirements?

A.

manual NAT exemption rule at the top of the NAT policy

B.

manual NAT exemption rule at the bottom of the NAT policy

C.

auto NAT exemption rule at the top of the NAT policy

D.

auto NAT exemption rule at the bottom of the NAT policy