Download Cisco.300-210.RealTests.2019-10-22.270q.vcex

Download Exam

File Info

Exam CCNP Security Implementing Cisco Threat Control Solutions
Number 300-210
File Name Cisco.300-210.RealTests.2019-10-22.270q.vcex
Size 10 MB
Posted Oct 22, 2019
Download Cisco.300-210.RealTests.2019-10-22.270q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which three operating systems are supported with Cisco AMP for Endpoints? (Choose three.)


  1. Windows
  2. AWS
  3. Android
  4. Cisco IOS
  5. OS X
  6. ChromeOS
Correct answer: ACE



Question 2

Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?


  1. explicit forward mode
  2. Layer 4 Traffic Monitor
  3. transparent mode
  4. Secure Web Proxy
Correct answer: B



Question 3

Which feature requires the network discovery policy for it to work on the Cisco Next Generation Intrusion Prevention System?


  1. impact flags
  2. URL filtering
  3. security intelligence
  4. health monitoring
Correct answer: C



Question 4

What are two arguments that can be used with the show content-scan command in Cisco IOS software? (Choose two.)


  1. data
  2. session
  3. buffer
  4. statistics
  5. verbose
Correct answer: BD



Question 5

What is a difference between a Cisco Content Security Management virtual appliance and a physical appliance?


  1. Migration between virtual appliances of varying sizes is possible, but physical appliances must be of equal size.
  2. The virtual appliance requires an additional license to run on a host.
  3. The physical appliance requires an additional license to activate its adapters.
  4. The physical appliance is configured with a DHCP-enabled management port to receive an IP address automatically, but you must assign the virtual appliance an IP address manually in your management subnet.
Correct answer: B



Question 6

Which detection method is also known as machine learning on Network-based Cisco Advanced Malware Protection?


  1. custom file detection
  2. hashing
  3. Spero engine
  4. dynamic analysis
Correct answer: C



Question 7

Which Cisco Firepower rule action displays a HTTP warning page and resets the connection of HTTP traffic specified in the access control rule?


  1. Interactive Block with Reset
  2. Block
  3. Allow with Warning
  4. Interactive Block
Correct answer: A



Question 8

  
Refer to the exhibit. Which option is a result of this configuration?


  1. All ingress traffic on the inside interface that matches the access list is redirected.
  2. All egress traffic on the outside interface that matches the access list if redirected.
  3. All TCP traffic that arrives on the inside interface is redirected.
  4. All ingress traffic that arrives on the inside interface is redirected.
  5. All ingress and egress traffic is redirected to the Cisco FirePOWER module.
Correct answer: E



Question 9

What are two requirements for configuring a hybrid interface in FirePOWER? (Choose two.)


  1. virtual network
  2. virtual router
  3. virtual appliance
  4. virtual switch
  5. virtual context
Correct answer: BD



Question 10

When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.)


  1. rootkit detection
  2. spam scanning
  3. APT detection
  4. antivirus scanning
  5. URL filtering
Correct answer: BD



Question 11

Which three operating systems are supported with Cisco AMP for Endpoints? (Choose three.)


  1. Windows
  2. AWS
  3. Android
  4. Cisco IOS
  5. OS X
  6. ChromeOS
Correct answer: ACE



Question 12

Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?


  1. explicit forward mode
  2. Layer 4 Traffic Monitor
  3. transparent mode
  4. Secure Web Proxy
Correct answer: B



Question 13

Which feature requires the network discovery policy for it to work on the Cisco Next Generation Intrusion Prevention System?


  1. impact flags
  2. URL filtering
  3. security intelligence
  4. health monitoring
Correct answer: C



Question 14

What are two arguments that can be used with the show content-scan command in Cisco IOS software? (Choose two.)


  1. data
  2. session
  3. buffer
  4. statistics
  5. verbose
Correct answer: BD



Question 15

What is a difference between a Cisco Content Security Management virtual appliance and a physical appliance?


  1. Migration between virtual appliances of varying sizes is possible, but physical appliances must be of equal size.
  2. The virtual appliance requires an additional license to run on a host.
  3. The physical appliance requires an additional license to activate its adapters.
  4. The physical appliance is configured with a DHCP-enabled management port to receive an IP address automatically, but you must assign the virtual appliance an IP address manually in your management subnet.
Correct answer: B



Question 16

Which detection method is also known as machine learning on Network-based Cisco Advanced Malware Protection?


  1. custom file detection
  2. hashing
  3. Spero engine
  4. dynamic analysis
Correct answer: C



Question 17

Which Cisco Firepower rule action displays a HTTP warning page and resets the connection of HTTP traffic specified in the access control rule?


  1. Interactive Block with Reset
  2. Block
  3. Allow with Warning
  4. Interactive Block
Correct answer: A



Question 18

  
Refer to the exhibit. Which option is a result of this configuration?


  1. All ingress traffic on the inside interface that matches the access list is redirected.
  2. All egress traffic on the outside interface that matches the access list if redirected.
  3. All TCP traffic that arrives on the inside interface is redirected.
  4. All ingress traffic that arrives on the inside interface is redirected.
  5. All ingress and egress traffic is redirected to the Cisco FirePOWER module.
Correct answer: E



Question 19

What are two requirements for configuring a hybrid interface in FirePOWER? (Choose two.)


  1. virtual network
  2. virtual router
  3. virtual appliance
  4. virtual switch
  5. virtual context
Correct answer: BD



Question 20

When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.)


  1. rootkit detection
  2. spam scanning
  3. APT detection
  4. antivirus scanning
  5. URL filtering
Correct answer: BD









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files