لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A Cisco FTD device is running in transparent firewall mode with a VTEP bridge group member ingress interface What must be considered by an engineer tasked with specifying a destination MAC address for a packet trace?
A. The destination MAC address is optional if a VLAN ID value is entered
B. Only the UDP packet type is supported
C. The output format option for the packet logs unavailable
D. The VLAN ID and destination MAC address are optional
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A security analyst must create a new report within Cisco FMC to show an overview of the daily attacks, vulnerabilities, and connections. The analyst wants to reuse specific dashboards from other reports to create this consolidated one. Which action accomplishes this task?
A. Create a new dashboard object via Object Management to represent the desired views
B. Modify the Custom Workflows within the Cisco FMC to feed the desired data into the new report
C. Copy the Malware Report and modify the sections to pull components from other reports
D. Use the import feature in the newly created report to select which dashboards to add
عرض الإجابة
اجابة صحيحة: C
السؤال #3
An engineer is restoring a Cisco FTD configuration from a remote backup using the command restore remote-manager-backup location 1.1.1.1 admin /volume/home/admin BACKUP_Cisc394602314.zip on a Cisco FMG. After connecting to the repository, an error occurred that prevents the FTD device from accepting the backup file. What is the problem?
A. The backup file is not in
B. The backup file is too large for the Cisco FTD device
C. The backup file extension was changed from tar to zip
D. The backup file was not enabled prior to being applied
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A security engineer is configuring an Access Control Policy for multiple branch locations These locations share a common rule set and utilize a network object called INSIDE_NET which contains the locally significant internal network subnets at each location What technique will retain the policy consistency at each location but allow only the locally significant network subnet within the applicable rules?
A. utilizing policy inheritance
B. utilizing a dynamic ACP that updates from Cisco Talos
C. creating a unique ACP per device
D. creating an ACP with an INSIDE_NET network object and object overrides
عرض الإجابة
اجابة صحيحة: D
السؤال #5
A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address https:///capture/CAPI/pcap/test.pcap. an error 403: Forbidden is given instead of the PCAP file. Which action must the engineer take to resolve this issue?
A. Disable the HTTPS server and use HTTP instead
B. Enable the HTTPS server for the device platform policy
C. Disable the proxy setting on the browser
D. Use the Cisco FTD IP address as the proxy server setting on the browser
عرض الإجابة
اجابة صحيحة: B
السؤال #6
An administrator is configuring their transparent Cisco FTD device to receive ERSPAN traffic from multiple switches on a passive port, but the Cisco FTD is not processing the traffic. What is the problem?
A. The switches do not have Layer 3 connectivity to the FTD device for GRE traffic transmission
B. The switches were not set up with a monitor session ID that matches the flow ID defined on the CiscoFTD
C. The Cisco FTD must be in routed mode to process ERSPAN traffic
D. The Cisco FTD must be configured with an ERSPAN port not a passive port
عرض الإجابة
اجابة صحيحة: B
السؤال #7
An administrator is attempting to add a new FTD device to their FMC behind a NAT device with a NAT ID of NAT001 and a password of Cisco0420l06525. The private IP address of the FMC server is 192.168.45.45. which is being translated to the public IP address of 209.165.200.225/27. Which command set must be used in order to accomplish this task?
A. configure manager add 209
B. configure manager add 192
C. configure manager add 209
D. configure manager add 209
عرض الإجابة
اجابة صحيحة: D
السؤال #8
An engineer is investigating connectivity problems on Cisco Firepower that is using service group tags. Specific devices are not being tagged correctly, which is preventing clients from using the proper policies when going through the firewall How is this issue resolved?
A. Use traceroute with advanced options
B. Use Wireshark with an IP subnet filter
C. Use a packet capture with match criteria
D. Use a packet sniffer with correct filtering
عرض الإجابة
اجابة صحيحة: A
السؤال #9
An organization is configuring a new Cisco Firepower High Availability deployment. Which action must be taken to ensure that failover is as seamless as possible to end users?
A. Set up a virtual failover MAC address between chassis
B. Use a dedicated stateful link between chassis
C. Load the same software version on both chassis
D. Set the same FQDN for both chassis
عرض الإجابة
اجابة صحيحة: A
السؤال #10
An engineer needs to configure remote storage on Cisco FMC. Configuration backups must be available from a secure location on the network for disaster recovery. Reports need to back up to a shared location that auditors can access with their Active Directory logins. Which strategy must the engineer use to meet these objectives?
A. Use SMB for backups and NFS for reports
B. Use NFS for both backups and reports
C. Use SMB for both backups and reports
D. Use SSH for backups and NFS for reports
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A company is in the process of deploying intrusion protection with Cisco FTDs managed by a Cisco FMC. Which action must be selected to enable fewer rules detect only critical conditions and avoid false positives?
A. Connectivity Over Security
B. Balanced Security and Connectivity
C. Maximum Detection
D. No Rules Active
عرض الإجابة
اجابة صحيحة: C
السؤال #12
An engineer is troubleshooting application failures through a FTD deployment. While using the FMC CLI. it has been determined that the traffic in question is not matching the desired policy. What should be done to correct this?
A. Use the system support firewall-engine-debug command to determine which rules the traffic matching and modify the rule accordingly
B. Use the system support application-identification-debug command to determine which rules the traffic matching and modify the rule accordingly
C. Use the system support firewall-engine-dump-user-f density-data command to change the policy and allow the application through the firewall
D. Use the system support network-options command to fine tune the policy
عرض الإجابة
اجابة صحيحة: D
السؤال #13
An engineer must configure a Cisco FMC dashboard in a multidomain deployment Which action must the engineer take to edit a report template from an ancestor domain?
A. Add it as a separate widget
B. Copy it to the current domain
C. Assign themselves ownership of it
D. Change the document attributes
عرض الإجابة
اجابة صحيحة: BE
السؤال #14
After deploying a network-monitoring tool to manage and monitor networking devices in your organization, you realize that you need to manually upload an MIB for the Cisco FMC. In which folder should you upload the MIB file?
A. /etc/sf/DCMIB
B. /sf/etc/DCEALERT
C. /etc/sf/DCEALERT
D. system/etc/DCEALERT
عرض الإجابة
اجابة صحيحة: C
السؤال #15
A security engineer must integrate an external feed containing STIX/TAXII data with Cisco FMC. Which feature must be enabled on the Cisco FMC to support this connection?
A. Cisco Success Network
B. Cisco Secure Endpoint Integration
C. Threat Intelligence Director
D. Security Intelligence Feeds
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A network administrator is configuring a Cisco AMP public cloud instance and wants to capture infections and polymorphic variants of a threat to help detect families of malware. Which detection engine meets this requirement?
A. RBAC
B. Tetra
C. Ethos
D. Spero
عرض الإجابة
اجابة صحيحة: C
السؤال #17
An engineer is investigating connectivity problems on Cisco Firepower for a specific SGT. Which command allows the engineer to capture real packets that pass through the firewall using an SGT of 64?
A. capture CAP type inline-tag 64 match ip any any
B. capture CAP match 64 type inline-tag ip any any
C. capture CAP headers-only type inline-tag 64 match ip any any
D. capture CAP buffer 64 match ip any any
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: