Exam 23: Implementing and Configuring Cisco Identity Services Engine (300-715 SISE)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which two conditions must be met to enable high availability between two Cisco FTD devices? (Choose two.)

(Multiple Choice)
4.9/5
(29)

An engineer is configuring a second Cisco FMC as a standby device but is unable to register with the active unit. What is causing this issue?

(Multiple Choice)
4.8/5
(34)

A network engineer is configuring URL Filtering on Firepower Threat Defense. Which two port requirements on the Firepower Management Center must be validated to allow communication with the cloud service? (Choose two.)

(Multiple Choice)
4.7/5
(27)

What is a result of enabling Cisco FTD clustering?

(Multiple Choice)
4.7/5
(34)

A connectivity issue is occurring between a client and a server which are communicating through a Cisco Firepower device. While troubleshooting, a network administrator sees that traffic is reaching the server, but the client is not getting a response. Which step must be taken to resolve this issue without initiating traffic from the client?

(Multiple Choice)
4.7/5
(32)

  Refer to the exhibit. What must be done to fix access to this website while preventing the same communication to all other websites? Refer to the exhibit. What must be done to fix access to this website while preventing the same communication to all other websites?

(Multiple Choice)
4.8/5
(35)

An administrator is attempting to remotely log into a switch in the data center using SSH and is unable to connect. How does the administrator confirm that traffic is reaching the firewall?

(Multiple Choice)
4.8/5
(38)

In a multi-tenant deployment where multiple domains are in use, which update should be applied outside of the Global Domain?

(Multiple Choice)
4.9/5
(29)

An engineer is attempting to create a new dashboard within the Cisco FMC to have a single view with widgets from many of the other dashboards. The goal is to have a mixture of threat and security related widgets along with Cisco Firepower device health information. Which two widgets must be configured to provide this information? (Choose two.)

(Multiple Choice)
4.8/5
(30)

What is a functionality of port objects in Cisco FMC?

(Multiple Choice)
4.9/5
(33)

Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?

(Multiple Choice)
4.8/5
(34)

Which two considerations must be made when deleting and re-adding devices while managing them via Cisco FMC? (Choose two.)

(Multiple Choice)
4.8/5
(32)

Which two deployment types support high availability? (Choose two.)

(Multiple Choice)
4.8/5
(23)

Which interface type allows packets to be dropped?

(Multiple Choice)
4.9/5
(36)

There is an increased amount of traffic on the network and for compliance reasons, management needs visibility into the encrypted traffic. What is a result of enabling TLS/SSL decryption to allow this visibility?

(Multiple Choice)
4.8/5
(37)

An administrator is setting up Cisco FirePower to send data to the Cisco Stealthwatch appliances. The NetFlow_Set_Parameters object is already created, but NetFlow is not being sent to the flow collector. What must be done to prevent this from occurring?

(Multiple Choice)
4.9/5
(36)

A user within an organization opened a malicious file on a workstation which in turn caused a ransomware attack on the network. What should be configured within the Cisco FMC to ensure the file is tested for viruses on a sandbox system?

(Multiple Choice)
4.9/5
(40)

An engineer must build redundancy into the network and traffic must continuously flow if a redundant switch in front of the firewall goes down. What must be configured to accomplish this task?

(Multiple Choice)
4.8/5
(42)

An organization has seen a lot of traffic congestion on their links going out to the internet. There is a Cisco Firepower device that processes all of the traffic going to the internet prior to leaving the enterprise. How is the congestion alleviated so that legitimate business traffic reaches the destination?

(Multiple Choice)
4.8/5
(30)

A security engineer is configuring an Access Control Policy for multiple branch locations. These locations share a common rule set and utilize a network object called INSIDE_NET which contains the locally significant internal network subnets at each location. What technique will retain the policy consistency at each location but allow only the locally significant network subnet within the applicable rules?

(Multiple Choice)
4.7/5
(39)
Showing 101 - 120 of 130
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)