Cisco CCNP Security 300-210 Exam Questions
Cisco CCNP Security 300-210 Exam Questions
Cisco CCNP Security 300-210 Exam Questions
(Choose two)
2. Which two descriptions of a Cisco FirePOWER NGIPS deployment that uses an inline Pair
Interface in tap mode are true? (Choose two.)
I am know C is correct.
Here is the information I have for Interface mode Inline Pair with Tap.
4. Which Cisco CWS traffic-redirection option is most appropriate for roaming users?
A. AnyConnect
B. CWS connector
C. WSAv connector
D. Cisco ASA
5. Which two features of Cisco Email Security can protect your organization against email
threats?(choose two)
6. A network engineer is configuring URL Filtering on the Cisco ASA with Firewall services.
Which two port requirements on the Firepower Management Center must be validated to allow
communication with the cloud service? (Choose two.)
A FireSIGHT System uses ports 443/HTTPS and 80/HTTP in order to communicate with the
cloud service. Port 443/HTTPS must be opened bidirectionally, and inbound access to port
80/HTTP must be allowed on the FireSIGHT Management Center.
https://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/117956-
technote-sourcefire-00.html#anc4
7. An engineer must evaluate the security gaps with their current WSA. What additional
protection does AMP offer for WSA?
8. Which two field can be used to create a new email alert within the Cisco Firepower
Management center under Policies > Actions > Alerts tab? (Choose two.)
A. Device
B. Source
C. Destination
D. From
E. Relay Host
10. Which Statement about decrypting traffic on the cisco Firepower appliance is true?
12. What is a purpose of the network analysis policy on a cisco Firepower NGIPS?
A. it specifies the outer-header criteria used to process traffic without using advanced inspection
B. it examines packets for attacks by using intrusion rules
C. it governs how traffic is preprocessed before inspection
D. it defines the rules for encrypting traffic
13. Which two Cisco ASA commands show if traffic is being redirected to the cisco Firepower
Module? (Choose two)
14. Which two statements about Cisco AMP for Web Security are true? (Choose two)
A. It can block critical files from exiting through the web gateway
B. it compares unknown files to a local threat repository
C. it can detect and block malware before it passes through the web gateway
D. it can perform file analysis by sandboxing suspected malware
E. it continues monitoring files after they pass the web gateway
A. Spero Analysis
B. Network Analysis
C. Dynamic Analysis
D. Intrusion Analysis
E. User Analysis
A. image signing
B. DDOS mitigation
C. SYN flood mitigation
D. flood mitigation
E. secure boot
17. You are troubleshooting the proxy connections going through a Cisco WSA. Which CLI tool
do you use to monitor a log file in real time?
A. grep
B. nslookup
C. dig
D. tail
18. Which action controls the amount of URI text that is stored in Cisco WSA logs files?
19. Which SSL decryption policy can be used to protect HTTPS servers from external traffic?
A. Decrypt Re-sign
B. Block
C. Decrypt Known Key
D. Enable SSL Decryption
20. Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private
cloud instance?
A. RBAC
B. ETHOS detection engine
C. SPERO detection engine
D. TETRA detection engine
21.
Global policy:
service-policy: global_policy
class-map: SFR
SFR: car status UP, mode fail-open monitor-only
Packet input 0, packet output 44715478687, drop 0, reset-drop 0
Refer to exhibit. Which two descriptions of the configurations of the Cisco FirePOWER Services
module are true? (Choose two)
22. Which cisco WSA feature supports access control using URL categories?
Refer to exhibit. Which tool do you use to verify whether a primary server established a
connection to Cisco CWS on a Cisco ASA ?
A. Telnet
B. Tcp ping
C. ping
D. traceroute
24. Which two tasks you must perform when you implement CWS on a Cisco ASA or ASAv?
(choose two)
25. Which two Cisco technologies must you use to enable transparent user identification on a
Cisco WSA? (Choose two)
27. Which function is the primary function of Cisco AMP threat Grid?
A. It provides the lowest total cost of ownership by reducing the need for physical appliances.
B. You can fine-tune its settings to provide the optimum balance security and performance for
you environment.
C. It provides email security while supporting the transition to the cloud.
D. It provides maximum protection and control of outbound messages.
29. Which technology does the Cisco AMP Spero detection engine use to identify threats?
A. fuzzy hashes
B. machine learning
C. dynamic analysis
D. Static analysis.
30. Which function is the primary function of Cisco AMP threat Grid? (choose two)
A. When a new appliance is added to the cluster it inherited the policy settings, content filters,
and outbreak quarantine settings of the cluster.
B. Each machine in the cluster can be a member of only one machine group
C. They can be managed from the CLI or with a GUI
D. They are deployed and managed using a peer-to-peer architecture.
E. They are deployed and managed using a master-slave architecture.
33. Which description of the Cisco ASA Connector in a Cisco CWS solution is true?
34. An engineer must evaluate the security gaps with their current WSA. What additional
protection does AMP offer for WSA?
35. What is the function of the Cisco Context Adaptive Scanning Engine in Cisco Hybrid Email
Security services?
A. It uses real-time traffic threat assessment to identify suspicious email senders and messages.
B. It provides a preventive defense against viruses by scanning messages before they enter the
network.
C. It analyzes message content and attachments to protect an organization’s intellectual property.
D. It protects against blended threats by using human-like logic to review and evaluate traffic.
36. Which two Snort actions are available by default creating Snort rules, regardless of
deployment mode? (Choose two)
A. activate
B. sdrop
C. drop
D. pass
E. reject
37. Which type of interface is needed to pass untagged VLAN traffic from one network to
another on a Cisco Firepower appliance 8130?
A. logical switched
B. logical routed
C. hybrid
D. physical routed
A. Spero analysis
B. Network analysis
C. User analysis
D. Dynamic analysis
E. Intrusion analysis
NEW QUESTION 474
Which description of a passive interface on a Cisco Firepower NGFW is true?
A. Protect
B. Server
C. Audit
D. tnage
A. Device trajectory
B. Prevalence
C. File trajectory
D. File analysis
A. After you create a content filter, you can create an encryption profile to encrypt messages that
match the filter.
B. Each content filter requires one or more actions.
C. They can be applied before a after message filters.
D. They are applied to the message after antispam and antivirus scanning is performed.
E. Each content filter requires one or more conditions
A. Secure boot
B. Image signing
C. Flood attack detection
D. SYN flood detection
E. DDoS mitigation
A. Orange public
B. Violet public and blue public
C. Violet public blue and green public
D. Red public and orange public
E. Red public
F. Violet public
A. RBAC
B. SPERO
C. TETRA detection engine
D. ETHOS detection engine
NEW QUESTION 482
An engineer is using the reporting feature on a WSA, which option must they consider about the
reporting capabilities?
A. Tracks information about policy updates that affect each file on a network.
B. Excludes information about file transmissions across the network.
C. Blocks the malware detected in a file sent across the network.
D. Display information about the actions performed on each file on a network.
A. Virtual NGIPS
B. All platform support clustering
C. Cisco Firepower appliance
D. FirePOWERE Threat Defense for ISR
A. WSAv connector
B. CWS connector
C. Cisco ASA
D. AnyConnect
NEW QUESTION 486
Which type of Cisco IPS deployment are you using if you are monitoring traffic with a SPAN
port?
A. Bypass deployment
B. Tap mode deployment
C. Passive deployment
D. Inline deployment
A. IP address
B. HA interface
C. Virtual router
D. 1Gbps interface
E. 10Gbps interface
A. Dynamic analysis
B. Static analysis
C. Fuzzy Hashes
D. Machine learning
looks like for 5585-x how to reload the command would be: hw-module module 1 reload
https://drive.google.com/drive/folders/1NvdSVL_xUerzxmWMtWKUPiJmd3ttAo
—————————————————-
1 D&D:
———————————————————–
1 ESA Simlet
———————————————————–
1. Which two Snort actions are available by default creating Snort rules, regardless of
deployment mode? (Choose two)
A. activate
B. sdrop
C. drop
D. pass
E. reject
Answer: AD
2. Which type of interface is needed to pass untagged VLAN traffic from one network to another
on a Cisco Firepower appliance 8130?
A. logical switched
B. logical routed
C. hybrid
D. physical routed
Answer: D
3. When you create an email alert in Policies->Action->Alerts what are the available fields
(choose two):
1)Destination
2)Source
3)Relay host
4)From
5)Device
Answer: 3 and 4
4. Which Statement about decrypting traffic on the cisco Firepower appliance is true? !!!
answer C
5. When you view a FireAmp Analysis Overview to mitigate a malware issue, where do you look
for infomation about servers .. attempted to download additional files?
A. Threat root cause section
B. Startup section
C. Involved IP Addresses section
D. Dropped Files section
answer C
6. You are troubleshooting the proxy connections going through a Cisco WSA. Which CLI tool
do you use to monitor a log file in real time?
A. grep
B. nslookup
C. dig
D. tail
Answer: D
7. Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Answer: B
8. Which SSL decryption policy can be used to protect HTTPS servers from external traffic?
Decrypt Re-sign
Block
Decrypt Known Key
Enable SSL Decryption
Answer: C
9. Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private
cloud instance?
RBAC
ETHOS detection engine
SPERO detection engine
TETRA detection engine
Answer: B
global policy:
service-policy: global_policy
class-map: SFR
SFR: car status UP, mode fail-open monitor-only
Packet input 0, packet output 44715478687, drop 0, reset-drop 0
Refer to exhibit. Which two descriptions of the configurations of the Cisco FirePOWER Services
module are true? (Choose two)
Answer: CD
Telnet
Tcp ping
ping
traceroute
Answer: B
12. which Cisco CWS traffic-redirection option is most appropriate for roaming users?
AnyConnect
CWS connector
WSAv connector
Cisco ASA
Answer: A
13. which two tasks you must perform when you implement CWS on a Cisco ASA or ASAv?
(choose two)
Answer: AE
14. which two Cisco technologies must you use to enable transparent user identification on a
Cisco WSA? (Choose two)
Answer: BE
15. which function is the primary function of Cisco AMP threat Grid?
Answer: C
16. which two statements about content filters on the Cisco ESA are true? (Choose two)
Answer: AE
17. which two routing options are valid with Cisco FirePOWER version 5.4? (Choose two)
Answer: BD
18. which function is the primary function of Cisco AMP threat Grid?
Answer: BC
It provides the lowest total cost of ownership by reducing the need for physical appliances.
You can fine-tune its settings to provide the optimum balance security and performance for you
environment.
It provides email security while supporting the transition to the cloud.
It provides maximum protection and control of outbound messages.
Answer: C
20. which technology does the Cisco AMP Spero detection engine use to identify threats?
fuzzy hashes
machine learning
dynamic analysis
Static analysis.
Answer: B
21. which two statements about ESA clusters are true? (Choose two.)
When a new appliance is added to the cluster it inherited the policy settings, content filters, and
outbreak quarantine settings of the cluster.
Each machine int the cluster can be a member of only one machine group
They can be managed from the CLI or with a GUI
They are deployed and managed using a peer-to-peer architecture.
They are deployed and managed using a master-slave architecture.
Answer: BD
22. An engineer must evaluate the security gaps with their current WSA. What additional
protection does AMP offer for WSA?
Answer: A