Cisco 300-710 Practice Exams
Last updated on Apr 01,2025- Exam Code: 300-710
- Exam Name: Securing Networks with Cisco Firepower (SNCF)
- Certification Provider: Cisco
- Latest update: Apr 01,2025
An organization is configuring a new Cisco Firepower High Availability deployment.
Which action must be taken to ensure that failover is as seamless as possible to end users?
- A . Set up a virtual failover MAC address between chassis.
- B . Use a dedicated stateful link between chassis.
- C . Load the same software version on both chassis.
- D . Set the same FQDN for both chassis.
An engineer is configuring URL filtering tor a Cisco Secure Firewall Threat Defense device in Cisco Secure Firewall Management Centre. Use’s must receive a warning when they access ..wwww badaduitsito com with the option of continuing to the website if they choose to No other websites should he blocked.
Which two actions must the engineer take to moot these requirements?
- A . Configure an access control rule that matches an URL object for http://www.Dadadullsile.com’ and set the action to Interactive Block.
- B . On the HTTP Responses tab of the access control policy editor, set the Interactive Block Response Page to System-provided.
- C . Configure the default action for the access control policy to Interactive Block.
- D . On the HTTP Responses tab of the access control policy editor set the Block Response Page to Custom.
- E . Configure an access control rule that matches the Adult URL category and sot the action to Interactive Block
Which two remediation options are available when Cisco FMC is integrated with Cisco ISE? (Choose two.)
- A . dynamic null route configured
- B . DHCP pool disablement
- C . quarantine
- D . port shutdown
- E . host shutdown
What is the benefit of selecting the trace option for packet capture?
- A . The option indicates whether the packet was dropped or successful.
- B . The option indicated whether the destination host responds through a different path.
- C . The option limits the number of packets that are captured.
- D . The option captures details of each packet.
An administrator is configuring a transparent Cisco FTD device to receive ERSPAN traffic from multiple switches on a passive port but the FTD is not processing the traffic.
What is the problem?
- A . The switches do not have Layer 3 connectivity to the FTD device for GRE traffic transmission.
- B . The FTD must be configured with an ERSPAN port, not a passive port.
- C . The FTD must &e in routed mode to process ERSPAN traffic.
- D . The switches were not set up with a monitor session ID (hat matches the flow ID defined on the FTD
On the advanced tab under inline set properties, which allows interfaces to emulate a passive interface?
- A . transparent inline mode
- B . TAP mode
- C . strict TCP enforcement
- D . propagate link state
A network administrator is deploying a new Cisco Secure Firewall Threat Defense (FTD) firewall After Cisco Secure FTD is deployed, inside clients nave intermittent connectivity to each other. When … the packet capture on the Secure FTD firewall, the administrator sees that Secure FID is responding to all the AW requests on the inside network.
Which action must the network administrator e to resolve the issue”
- A . Review NAT policy and disable incorrect proxy ARP configuration.
- B . Hardcode the MAC address of the FTD to IP mapping on client machines.
- C . Review the access policy and verify that ARP is allowed from inside to inside.
- D . Convert the FTD to transparent mode to allow ARP requests.
Encrypted Visibility Engine (EVE) is enabled under which lab on an access control policy in Cisco Secure Firewall Management Centre?
- A . Network Analysis Policy
- B . Advanced
- C . Security Intelligence
- D . SSL
An engineer is implementing Cisco FTD in the network and is determining which Firepower mode to use. The organization needs to have multiple virtual Firepower devices working separately inside of the FTD appliance to provide traffic segmentation.
Which deployment mode should be configured in the Cisco Firepower Management Console to support these requirements?
- A . multiple deployment
- B . single-context
- C . single deployment
- D . multi-instance
The administrator notices that there is malware present with an .exe extension and needs to verify if any of the systems on the network are running the executable file.
What must be configured within Cisco AMP for Endpoints to show this data?
- A . prevalence
- B . threat root cause
- C . vulnerable software
- D . file analysis