Download Cisco.300-210.Pass4Sure.2018-08-23.218q.vcex

Download Exam

File Info

Exam CCNP Security Implementing Cisco Threat Control Solutions
Number 300-210
File Name Cisco.300-210.Pass4Sure.2018-08-23.218q.vcex
Size 5 MB
Posted Aug 23, 2018
Download Cisco.300-210.Pass4Sure.2018-08-23.218q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.)


  1. If it is between -10 and -4, the email is blocked
  2. If it is between +1 and +10, the email is accepted
  3. If it is between -10 and -3, the email is blocked
  4. If it is between -10 and -3, the email is sent to the virus and spam engines for additional scanning
  5. If it is between -3 and +1, the email is accepted and additional emails from the sender are throttled
  6. If it is between -1 and +10, the email is accepted
  7. If it is between -3 and -1, the email is accepted and additional emails from the sender are throttled
  8. If it is between -4 and +1, the email is accepted and additional emails from the sender are throttled
Correct answer: CFG



Question 2

What is the function of the Web Proxy Auto-Discovery protocol?


  1. It enables a web client’s traffic flows to be redirected in real time.
  2. It enables web clients to dynamically resolve hostname records.
  3. It enables a web client to download a script or configuration file that is named by a URL.
  4. It enables a web client to discover the URL of a configuration file.
Correct answer: D



Question 3

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?


  1. health policy
  2. system policy
  3. correlation policy
  4. access control policy
  5. health awareness policy
Correct answer: A



Question 4

Which piece of information required to perform a policy trace for the Cisco WSA?


  1. the destination IP address of the trace
  2. the source IP address of the trace
  3. the URL to trace
  4. authentication credentials to make the request
Correct answer: C



Question 5

With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes through the appliance?


  1. transparent
  2. routed
  3. passive
  4. inline set
  5. inline tap
Correct answer: C



Question 6

Which three routing options are valid with Cisco FirePOWER version 5.4? (Choose three.)


  1. Layer 3 routing with EIGRP
  2. Layer 3 routing with OSPF not-so-stubby area
  3. Layer 3 routing with RIPv2
  4. Layer 3 routing with RIPv1
  5. Layer 3 routing with OSPF stub area
  6. Layer 3 routing with static routes
Correct answer: CDF



Question 7

Which website can be used to validate group information about connections that flow through Cisco CWS?


  1. whoami.scansafe.com
  2. policytrace.scansafe.com
  3. policytrace.scansafe.net
  4. whoami.scansafe.net
Correct answer: C



Question 8

Which three statements about Cisco CWS are true? (Choose three.)


  1. Its Cognitive Analytics feature uses cloud-based analysis and detection to block threats outside the network.
  2. It provides protection against zero-day threats.
  3. Its Roaming User Protection feature protects the VPN from malware and data breaches.
  4. Cisco TALOS provides it with threat updates in near real time.
  5. It supports granular application policies.
  6. It supports local content caching.
Correct answer: BDE



Question 9

Which Cisco Advanced Malware Protection for Endpoints deployment architecture is designed to keep data within a network perimeter?


  1. cloud web services
  2. network AMP
  3. private cloud
  4. public cloud
Correct answer: C



Question 10

Which type of policy do you configure if you want to look for a combination of events using Boolean logic?


  1. correlation
  2. application detector
  3. traffic profile
  4. access control
  5. intrusion
Correct answer: A



Question 11

Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.)


  1. If it is between -10 and -4, the email is blocked
  2. If it is between +1 and +10, the email is accepted
  3. If it is between -10 and -3, the email is blocked
  4. If it is between -10 and -3, the email is sent to the virus and spam engines for additional scanning
  5. If it is between -3 and +1, the email is accepted and additional emails from the sender are throttled
  6. If it is between -1 and +10, the email is accepted
  7. If it is between -3 and -1, the email is accepted and additional emails from the sender are throttled
  8. If it is between -4 and +1, the email is accepted and additional emails from the sender are throttled
Correct answer: CFG



Question 12

What is the function of the Web Proxy Auto-Discovery protocol?


  1. It enables a web client’s traffic flows to be redirected in real time.
  2. It enables web clients to dynamically resolve hostname records.
  3. It enables a web client to download a script or configuration file that is named by a URL.
  4. It enables a web client to discover the URL of a configuration file.
Correct answer: D



Question 13

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?


  1. health policy
  2. system policy
  3. correlation policy
  4. access control policy
  5. health awareness policy
Correct answer: A



Question 14

Which piece of information required to perform a policy trace for the Cisco WSA?


  1. the destination IP address of the trace
  2. the source IP address of the trace
  3. the URL to trace
  4. authentication credentials to make the request
Correct answer: C



Question 15

With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes through the appliance?


  1. transparent
  2. routed
  3. passive
  4. inline set
  5. inline tap
Correct answer: C



Question 16

Which three routing options are valid with Cisco FirePOWER version 5.4? (Choose three.)


  1. Layer 3 routing with EIGRP
  2. Layer 3 routing with OSPF not-so-stubby area
  3. Layer 3 routing with RIPv2
  4. Layer 3 routing with RIPv1
  5. Layer 3 routing with OSPF stub area
  6. Layer 3 routing with static routes
Correct answer: CDF



Question 17

Which website can be used to validate group information about connections that flow through Cisco CWS?


  1. whoami.scansafe.com
  2. policytrace.scansafe.com
  3. policytrace.scansafe.net
  4. whoami.scansafe.net
Correct answer: C



Question 18

Which three statements about Cisco CWS are true? (Choose three.)


  1. Its Cognitive Analytics feature uses cloud-based analysis and detection to block threats outside the network.
  2. It provides protection against zero-day threats.
  3. Its Roaming User Protection feature protects the VPN from malware and data breaches.
  4. Cisco TALOS provides it with threat updates in near real time.
  5. It supports granular application policies.
  6. It supports local content caching.
Correct answer: BDE



Question 19

Which Cisco Advanced Malware Protection for Endpoints deployment architecture is designed to keep data within a network perimeter?


  1. cloud web services
  2. network AMP
  3. private cloud
  4. public cloud
Correct answer: C



Question 20

Which type of policy do you configure if you want to look for a combination of events using Boolean logic?


  1. correlation
  2. application detector
  3. traffic profile
  4. access control
  5. intrusion
Correct answer: A



Question 21

Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.)


  1. If it is between -10 and -4, the email is blocked
  2. If it is between +1 and +10, the email is accepted
  3. If it is between -10 and -3, the email is blocked
  4. If it is between -10 and -3, the email is sent to the virus and spam engines for additional scanning
  5. If it is between -3 and +1, the email is accepted and additional emails from the sender are throttled
  6. If it is between -1 and +10, the email is accepted
  7. If it is between -3 and -1, the email is accepted and additional emails from the sender are throttled
  8. If it is between -4 and +1, the email is accepted and additional emails from the sender are throttled
Correct answer: CFG



Question 22

What is the function of the Web Proxy Auto-Discovery protocol?


  1. It enables a web client’s traffic flows to be redirected in real time.
  2. It enables web clients to dynamically resolve hostname records.
  3. It enables a web client to download a script or configuration file that is named by a URL.
  4. It enables a web client to discover the URL of a configuration file.
Correct answer: D



Question 23

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?


  1. health policy
  2. system policy
  3. correlation policy
  4. access control policy
  5. health awareness policy
Correct answer: A



Question 24

Which piece of information required to perform a policy trace for the Cisco WSA?


  1. the destination IP address of the trace
  2. the source IP address of the trace
  3. the URL to trace
  4. authentication credentials to make the request
Correct answer: C



Question 25

With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes through the appliance?


  1. transparent
  2. routed
  3. passive
  4. inline set
  5. inline tap
Correct answer: C



Question 26

Which three routing options are valid with Cisco FirePOWER version 5.4? (Choose three.)


  1. Layer 3 routing with EIGRP
  2. Layer 3 routing with OSPF not-so-stubby area
  3. Layer 3 routing with RIPv2
  4. Layer 3 routing with RIPv1
  5. Layer 3 routing with OSPF stub area
  6. Layer 3 routing with static routes
Correct answer: CDF



Question 27

Which website can be used to validate group information about connections that flow through Cisco CWS?


  1. whoami.scansafe.com
  2. policytrace.scansafe.com
  3. policytrace.scansafe.net
  4. whoami.scansafe.net
Correct answer: C



Question 28

Which three statements about Cisco CWS are true? (Choose three.)


  1. Its Cognitive Analytics feature uses cloud-based analysis and detection to block threats outside the network.
  2. It provides protection against zero-day threats.
  3. Its Roaming User Protection feature protects the VPN from malware and data breaches.
  4. Cisco TALOS provides it with threat updates in near real time.
  5. It supports granular application policies.
  6. It supports local content caching.
Correct answer: BDE



Question 29

Which Cisco Advanced Malware Protection for Endpoints deployment architecture is designed to keep data within a network perimeter?


  1. cloud web services
  2. network AMP
  3. private cloud
  4. public cloud
Correct answer: C



Question 30

Which type of policy do you configure if you want to look for a combination of events using Boolean logic?


  1. correlation
  2. application detector
  3. traffic profile
  4. access control
  5. intrusion
Correct answer: A



Question 31

Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.)


  1. If it is between -10 and -4, the email is blocked
  2. If it is between +1 and +10, the email is accepted
  3. If it is between -10 and -3, the email is blocked
  4. If it is between -10 and -3, the email is sent to the virus and spam engines for additional scanning
  5. If it is between -3 and +1, the email is accepted and additional emails from the sender are throttled
  6. If it is between -1 and +10, the email is accepted
  7. If it is between -3 and -1, the email is accepted and additional emails from the sender are throttled
  8. If it is between -4 and +1, the email is accepted and additional emails from the sender are throttled
Correct answer: CFG



Question 32

What is the function of the Web Proxy Auto-Discovery protocol?


  1. It enables a web client’s traffic flows to be redirected in real time.
  2. It enables web clients to dynamically resolve hostname records.
  3. It enables a web client to download a script or configuration file that is named by a URL.
  4. It enables a web client to discover the URL of a configuration file.
Correct answer: D



Question 33

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?


  1. health policy
  2. system policy
  3. correlation policy
  4. access control policy
  5. health awareness policy
Correct answer: A



Question 34

Which piece of information required to perform a policy trace for the Cisco WSA?


  1. the destination IP address of the trace
  2. the source IP address of the trace
  3. the URL to trace
  4. authentication credentials to make the request
Correct answer: C



Question 35

With Cisco FirePOWER Threat Defense software, which interface mode do you configure to passively receive traffic that passes through the appliance?


  1. transparent
  2. routed
  3. passive
  4. inline set
  5. inline tap
Correct answer: C



Question 36

Which three routing options are valid with Cisco FirePOWER version 5.4? (Choose three.)


  1. Layer 3 routing with EIGRP
  2. Layer 3 routing with OSPF not-so-stubby area
  3. Layer 3 routing with RIPv2
  4. Layer 3 routing with RIPv1
  5. Layer 3 routing with OSPF stub area
  6. Layer 3 routing with static routes
Correct answer: CDF



Question 37

Which website can be used to validate group information about connections that flow through Cisco CWS?


  1. whoami.scansafe.com
  2. policytrace.scansafe.com
  3. policytrace.scansafe.net
  4. whoami.scansafe.net
Correct answer: C



Question 38

Which three statements about Cisco CWS are true? (Choose three.)


  1. Its Cognitive Analytics feature uses cloud-based analysis and detection to block threats outside the network.
  2. It provides protection against zero-day threats.
  3. Its Roaming User Protection feature protects the VPN from malware and data breaches.
  4. Cisco TALOS provides it with threat updates in near real time.
  5. It supports granular application policies.
  6. It supports local content caching.
Correct answer: BDE



Question 39

Which Cisco Advanced Malware Protection for Endpoints deployment architecture is designed to keep data within a network perimeter?


  1. cloud web services
  2. network AMP
  3. private cloud
  4. public cloud
Correct answer: C



Question 40

Which type of policy do you configure if you want to look for a combination of events using Boolean logic?


  1. correlation
  2. application detector
  3. traffic profile
  4. access control
  5. intrusion
Correct answer: A









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files