Exam 23: Implementing and Configuring Cisco Identity Services Engine (300-715 SISE)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An organization has implemented Cisco Firepower without IPS capabilities and now wants to enable inspection for their traffic. They need to be able to detect protocol anomalies and utilize the Snort rule sets to detect malicious behavior. How is this accomplished?

(Multiple Choice)
4.8/5
(30)

An administrator is creating interface objects to better segment their network but is having trouble adding interfaces to the objects. What is the reason for this failure?

(Multiple Choice)
4.8/5
(29)

The event dashboard within the Cisco FMC has been inundated with low priority intrusion drop events, which are overshadowing high priority events. An engineer has been tasked with reviewing the policies and reducing the low priority events. Which action should be configured to accomplish this task?

(Multiple Choice)
4.8/5
(37)

Which Cisco Firepower rule action displays an HTTP warning page?

(Multiple Choice)
4.9/5
(34)

After deploying a network-monitoring tool to manage and monitor networking devices in your organization, you realize that you need to manually upload an MIB for the Cisco FMC. In which folder should you upload the MIB file?

(Multiple Choice)
4.7/5
(30)

An engineer is configuring a Cisco FTD appliance in IPS-only mode and needs to utilize fail-to-wire interfaces. Which interface mode should be used to meet these requirements?

(Multiple Choice)
4.9/5
(33)

Which CLI command is used to control special handling of ClientHello messages?

(Multiple Choice)
4.9/5
(32)

A network administrator is seeing an unknown verdict for a file detected by Cisco FTD. Which malware policy configuration option must be selected in order to further analyze the file in the Talos cloud?

(Multiple Choice)
4.7/5
(33)

A network administrator notices that SI events are not being updated. The Cisco FTD device is unable to load all of the SI event entries and traffic is not being blocked as expected. What must be done to correct this issue?

(Multiple Choice)
4.9/5
(30)

An engineer configures a network discovery policy on Cisco FMC. Upon configuration, it is noticed that excessive and misleading events are filling the database and overloading the Cisco FMC. A monitored NAT device is executing multiple updates of its operating system in a short period of time. What configuration change must be made to alleviate this issue?

(Multiple Choice)
4.8/5
(30)

Which two dynamic routing protocols are supported in Firepower Threat Defense without using FlexConfig? (Choose two.)

(Multiple Choice)
4.8/5
(33)

Which command is run on an FTD unit to associate the unit to an FMC manager that is at IP address 10.0.0.10, and that has the registration key Cisco123?

(Multiple Choice)
4.8/5
(35)

  Refer to the exhibit. An organization has an access control rule with the intention of sending all social media traffic for inspection. After using the rule for some time, the administrator notices that the traffic is not being inspected, but is being automatically allowed. What must be done to address this issue? Refer to the exhibit. An organization has an access control rule with the intention of sending all social media traffic for inspection. After using the rule for some time, the administrator notices that the traffic is not being inspected, but is being automatically allowed. What must be done to address this issue?

(Multiple Choice)
4.8/5
(24)

A security engineer is configuring an Access Control Policy for multiple branch locations. These locations share a common rule set and utilize a network object called INSIDE_NET which contains the locally significant internal network subnets at each location. What technique will retain the policy consistency at each location but allow only the locally significant network subnet within the application rules?

(Multiple Choice)
4.9/5
(32)

Which command is typed at the CLI on the primary Cisco FTD unit to temporarily stop running high-availability?

(Multiple Choice)
4.8/5
(30)

A network engineer wants to add a third-party threat feed into the Cisco FMC for enhanced threat detection. Which action should be taken to accomplish this goal?

(Multiple Choice)
4.8/5
(37)

A network administrator discovers that a user connected to a file server and downloaded a malware file. The Cisco FMC generated an alert for the malware event, however the user still remained connected. Which Cisco AMP file rule action within the Cisco FMC must be set to resolve this issue?

(Multiple Choice)
4.9/5
(46)

Which license type is required on Cisco ISE to integrate with Cisco FMC pxGrid?

(Multiple Choice)
4.9/5
(28)

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

(Multiple Choice)
4.8/5
(32)

Which two statements about bridge-group interfaces in Cisco FTD are true? (Choose two.)

(Multiple Choice)
4.6/5
(31)
Showing 81 - 100 of 130
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)