Exam 23: Implementing and Configuring Cisco Identity Services Engine (300-715 SISE)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which two conditions are necessary for high availability to function between two Cisco FTD devices? (Choose two.)

Free
(Multiple Choice)
4.7/5
(31)
Correct Answer:
Verified

A,E

A network engineer is extending a user segment through an FTD device for traffic inspection without creating another IP subnet. How is this accomplished on an FTD device in routed mode?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

A

Which group within Cisco does the Threat Response team use for threat analysis and research?

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

D

What are two application layer preprocessors? (Choose two.)

(Multiple Choice)
4.8/5
(43)

What is a behavior of a Cisco FMC database purge?

(Multiple Choice)
4.7/5
(24)

With a recent summer time change, system logs are showing activity that occurred to be an hour behind real time. Which action should be taken to resolve this issue?

(Multiple Choice)
4.9/5
(34)

What is the difference between inline and inline tap on Cisco Firepower?

(Multiple Choice)
4.8/5
(35)

Which feature within the Cisco FMC web interface allows for detecting, analyzing, and blocking malware in network traffic?

(Multiple Choice)
4.9/5
(29)

Which Cisco Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)

(Multiple Choice)
4.8/5
(32)

An engineer is tasked with deploying an internal perimeter firewall that will support multiple DMZs. Each DMZ has a unique private IP subnet range. How is this requirement satisfied?

(Multiple Choice)
5.0/5
(38)

What are the minimum requirements to deploy a managed device inline?

(Multiple Choice)
4.8/5
(40)

Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?

(Multiple Choice)
4.7/5
(38)

Which two actions can be used in an access control policy rule? (Choose two.)

(Multiple Choice)
5.0/5
(33)

A network administrator is concerned about the high number of malware files affecting users' machines. What must be done within the access control policy in Cisco FMC to address this concern?

(Multiple Choice)
4.8/5
(30)

A hospital network needs to upgrade their Cisco FMC managed devices and needs to ensure that a disaster recovery process is in place. What must be done in order to minimize downtime on the network?

(Multiple Choice)
4.9/5
(35)

Which report template field format is available in Cisco FMC?

(Multiple Choice)
4.8/5
(38)

With Cisco Firepower Threat Defense software, which interface mode must be configured to passively receive traffic that passes through the appliance?

(Multiple Choice)
4.9/5
(36)

Which Cisco AMP for Endpoints policy is used only for monitoring endpoint activity?

(Multiple Choice)
4.7/5
(34)

An engineer is restoring a Cisco FTD configuration from a remote backup using the command restore remote-manager-backup location 1.1.1.1 admin /Volume/home/admin BACKUP_Cisc394602314.zip on a Cisco FMC. After connecting to the repository, an error occurred that prevents the FTD device from accepting the backup file. What is the problem?

(Multiple Choice)
4.9/5
(31)

After using Firepower for some time and learning about how it interacts with the network, an administrator is trying to correlate malicious activity with a user. Which widget should be configured to provide this visibility on the Cisco Firepower dashboards?

(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 130
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)