All About 300-210 test question Oct 2017

Exam Code: 300-210 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Implementing Cisco Threat Control Solutions (SITCS)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 300-210 Exam.

Q11. When creating an SSL policy on Cisco FirePOWER, which three options do you have

A. do not decrypt

B. trust

C. allow

D. block with reset

E. block

F. encrypt

Answer: A D E

Explanation

http://www.cisco.com/c/en/us/support/docs/security/firesight-management-center/200202-Configuration-of-an-S


Q12. Which three operating systems are supported with Cisco AMP for Endpoints? (Choose three.)

A. Windows

B. AWS

C. Android

D. Cisco IOS

E. OS X

F. ChromeOS

Answer: A C E

Explanation

http://www.cisco.com/c/en/us/products/security/fireamp-endpoints/index.html


Q13. Which interface type allows packets to be dropped?

A. passive

B. inline

C. TAP

D. either passive or inline, provided that the intrusion policy has the Drop When Inline check box selected.

Answer: D


Q14. Which two TCP ports can allow the Cisco Firepower Management Center to communication with FireAMP cloud for file disposition information? (Choose two.)

A. 8080

B. 22

C. 8305

D. 32137

E. 443

Answer: D E

Explanation

http://www.cisco.com/c/en/us/support/docs/security/sourcefire-fireamp-private-cloud-virtual-appliance/118336-

&pos=2&

page=http://www.cisco.com/c/en/us/support/docs/security/sourcefire-amp-appliances/118121-technote-sourcefir


Q15. Which detection method is also known as machine learning on Network-based Cisco Advanced Malware Protection?

A. custom file detection

B. hashing

C. Spero engine

D. dynamic analysis

Answer: D


Q16. Which Cisco AMP for Endpoints, what, is meant by simple custom detection?

A. It is a rule for identifying a file that should be whitelisted by Cisco AMP.

B. It is a method for identifying and quarantining a specific file by its SHA-256 hash.

C. It is a feature for configuring a personal firewall.

D. It is a method for identifying and quarantining a set of files by regular expression language.

Answer: A


Q17. A system administrator wants to know if the email traffic from a remote partner will active special treatment message filters that are created just for them. Which tool on the Cisco Email Security gateway can you use to debug and emulate the flow that a message takes through the work queue?

A. the trace tool

B. centralized or local message tracking

C. the CLI findevent command

D. the CLI grep command

E. the message tracker interface

Answer: A


Q18. Which three routing options are valid with Cisco FirePOWER version 5.4? (Choose three.)

A. Layer 3 routing with EIGRP

B. Layer 3 routing with OSPF not-so-stubby area

C. Layer 3 routing with RiPv2

D. Layer 3 routing with RIPvl

E. Layer 3 routing with OSPF stub area

F. Layer 3 routing with static routes

Answer: D E F

Explanation

http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/In


Q19. A system administrator wants to know if the email traffic from a remote partner will active special treatment message filters that are created just for them. Which tool on the Cisco Email Security gateway can you use to debug and emulate the flow that a message takes through the work queue?

A. the trace tool

B. centralized or local message tracking

C. the CLI findevent command

D. the CLI grep command

E. the message tracker interface

Answer: A


Q20. When you create a new server profile on the Cisco ESA, which subcommand of the ldapconfig command configures spam quarantine end-user authentication?

A. server

B. test

C. isqalias

D. isqauth

Answer: D