300-210 Premium Bundle

300-210 Premium Bundle

Implementing Cisco Threat Control Solutions (SITCS) Certification Exam

4.5 
(48510 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Cisco 300-210 Free Practice Questions

Passleader 300-210 Questions are updated and all 300-210 answers are verified by experts. Once you have completely prepared with our 300-210 exam prep kits you will be ready for the real 300-210 exam without a problem. We have Rebirth Cisco 300-210 dumps study guide. PASSED 300-210 First attempt! Here What I Did.

Online Cisco 300-210 free dumps demo Below:

NEW QUESTION 1

Which Cisco WSA is intended for deployment in organizations of more than 6000 users?

  • A. WSA S370
  • B. WSA S670
  • C. WSA S370-2RU
  • D. WSA S170

Answer: B

NEW QUESTION 2

An engineer manages a Cisco Intrusion Prevention System via IME. A new user must be able to tune signatures, but must not be able to create new users. Which role for the new user is correct?

  • A. viewer
  • B. service
  • C. operator
  • D. administrator

Answer: C

Explanation:

http://www.cisco.com/c/en/us/td/docs/security/ips/7-0/command/reference/cmdref/crIntro.html

NEW QUESTION 3

When learning accept mode is set to auto, and the action is set to rotate, when is the KB created and used?

  • A. It is created every 24 hours and used for 24 hours.
  • B. It is created every 24 hours, but the current KB is used.
  • C. It is created every 1 hour and used for 24 hours.
  • D. A KB is created only in manual mode.

Answer: A

NEW QUESTION 4

Which Cisco technology provides spam filtering and email protection?

  • A. IPS
  • B. ESA
  • C. WSA
  • D. CX

Answer: B

NEW QUESTION 5

If learning accept mode is set to "auto" and the knowledge base is loaded only when explicitly requested on the IPS, which statement about the knowledge base is true?

  • A. The knowledge base is set to load dynamically.
  • B. The knowledge base is set to "save only."
  • C. The knowledge base is set to "discarded."
  • D. The knowledge base is set to load statically.

Answer: B

NEW QUESTION 6

Which command establishes a virtual console session to a CX module within a Cisco Adaptive Security Appliance?

  • A. session 1 ip address
  • B. session 2 ip address
  • C. session 1
  • D. session ips console
  • E. session cxsc console

Answer: E

NEW QUESTION 7

Which two appliances support logical routed interfaces? (Choose two.)

  • A. FirePOWER services for ASA-5500-X
  • B. FP-4100-series
  • C. FP-8000-series
  • D. FP-7000-series
  • E. FP-9300-series

Answer: D

NEW QUESTION 8

Which three protocols are required when considering firewall rules for email services using a Cisco Email Security Appliance? (Choose three.)

  • A. SMTP
  • B. HTTP
  • C. DNS
  • D. SNMP
  • E. FTP

Answer: ABC

NEW QUESTION 9

A web security appliance is inspecting inbound traffic. In which sequence is inbound https traffic inspected?

  • A. Routing Policy > Decryption Policy > Access Policy
  • B. Access Policy > Decryption Policy > Routing Policy
  • C. Routing Policy > Access Policy > Decryption Policy
  • D. Decryption Policy > Access Policy > Routing Policy
  • E. Decryption Policy > Routing Policy > Access Policy
  • F. Access Policy > Routing Policy > Decryption Policy

Answer: B

NEW QUESTION 10

Which redundancy protocol is available for Cisco firepower but is a limitation for the WSA?

  • A. VVRP
  • B. HSRP
  • C. SFRP
  • D. GLBR

Answer: C

NEW QUESTION 11

How many interfaces can a Cisco ASA bridge group support and how many bridge groups can a Cisco ASA appliance support?

  • A. up to 2 interfaces per bridge group and up to 4 bridge groups per Cisco ASA appliance
  • B. up to 2 interfaces per bridge group and up to 8 bridge groups per Cisco ASA appliance
  • C. up to 4 interfaces per bridge group and up to 4 bridge groups per Cisco ASA appliance
  • D. up to 4 interfaces per bridge group and up to 8 bridge groups per Cisco ASA appliance
  • E. up to 8 interfaces per bridge group and up to 4 bridge groups per Cisco ASA appliance
  • F. up to 8 interfaces per bridge group and up to 8 bridge groups per Cisco ASA appliance

Answer: D

NEW QUESTION 12

What are three benefits of the Cisco AnyConnect Secure Mobility Solution? (Choose three.)

  • A. It can protect against command-injection and directory-traversal attacks.
  • B. It provides Internet transport while maintaining corporate security policies.
  • C. It provides secure remote access to managed computers.
  • D. It provides clientless remote access to multiple network-based systems.
  • E. It enforces security policies, regardless of the user location.
  • F. It uses ACLs to determine best-route connections for clients in a secure environment.

Answer: BCE

NEW QUESTION 13

Which Cisco AMP file disposition valid?

  • A. pristine
  • B. malware
  • C. dirty
  • D. nonmalicios

Answer: B

Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-v60/Refere

NEW QUESTION 14

Refer to the exhibit.
300-210 dumps exhibit
What Cisco ESACLI command generated the output?

  • A. smtproutes
  • B. tophosts
  • C. hoststatus
  • D. workqueuestatus

Answer: B

NEW QUESTION 15

What is the CLI command to create a new Message Filter in a Cisco Email Security Appliance?

  • A. filterconfig
  • B. filters new
  • C. messagefilters
  • D. policyconfig-- inbound or outbound-- filters

Answer: B

NEW QUESTION 16

In order to set up HTTPS decryption on the Cisco Web Security Appliance, which two steps must be performed? (Choose two.)

  • A. Enable and accept the EULA under Security Services > HTTPS Proxy.
  • B. Upload a publicly signed server certificate.
  • C. Configure or upload a certificate authority certificate.
  • D. Enable HTTPS decryption in Web Security Manager > Access Policies.

Answer: AC

NEW QUESTION 17

What is the function of the Web Proxy Auto Discovery protocol?

  • A. It enables a web client's traffic flows to be redirected in real time.
  • B. It enables web clients to dynamically resolve hostname records.
  • C. It enables a web client to download a script or configuration file that is named by a URL.
  • D. It enables a web client to discover the URL of a configuration file.

Answer: D

NEW QUESTION 18

Which option represents the cisco event aggregation product?

  • A. CVSS system
  • B. IntelliShield
  • C. ASACX Event Viewer
  • D. ASDM 7

Answer: C

NEW QUESTION 19

Which three zones are used for anomaly detection in a Cisco IPS? (Choose three.)

  • A. internal zone
  • B. external zone
  • C. illegal zone
  • D. inside zone
  • E. outside zone
  • F. DMZ zone

Answer: ABC

NEW QUESTION 20

With Cisco ASA active/standby failover, what is needed to enable subsecond failover?

  • A. Use redundant interfaces.
  • B. Enable the stateful failover interface between the primary and secondary Cisco ASA.
  • C. Decrease the default unit failover polltime to 300 msec and the unit failover holdtime to 900 msec.
  • D. Decrease the default number of monitored interfaces to 1

Answer: C

NEW QUESTION 21

Which three options are characteristics of router-based IPS? (Choose three.)

  • A. It is used for large networks.
  • B. It is used for small networks.
  • C. It supports virtual sensors.
  • D. It supports multiple VRFs.
  • E. It uses configurable anomaly detection.
  • F. Signature definition files have been deprecated.

Answer: BDF

NEW QUESTION 22

Which signature engine is responsible for ICMP inspection on Cisco IPS?

  • A. AICEngine
  • B. Fixed Engine
  • C. Service Engine
  • D. Atomic IP Engine

Answer: D

NEW QUESTION 23

Which three protocols are required when considering firewall rules email services using a Cisco Email Security Appliance?

  • A. HTTP
  • B. SMTP
  • C. TFTP
  • D. FTP
  • E. DNS
  • F. SNMP

Answer: ABE

NEW QUESTION 24

Which standby protocol which works on NGIPS but not on CWS?

  • A. HSRP
  • B. GLBP
  • C. SFRP
  • D. VRRP

Answer: C

NEW QUESTION 25

Which four advanced endpoint assessment statements are correct? (Choose four.)

  • A. examines the remote computer for personnel firewalls applications
  • B. examines the remote computer for antivirus applications
  • C. examines the remote computer for antispyware applications
  • D. examines the remote computer for malware applications
  • E. does not perform any remediation but provides input that can be evaluated by DAP records
  • F. performs active remediation by applying rules, activating modules, and providing updates where applicable

Answer: ABCF

NEW QUESTION 26

300-210 dumps exhibit
300-210 dumps exhibit
300-210 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
We need to create a policy map named inside-policy and send the traffic to the CXSC blade:
ASA-FW# config t
ASA-FW(config)# policy-map inside-policy
ASA-FW(config-pmap)# policy-map inside-policy ASA-FW(config-pmap)# class class-default
ASA-FW(config-pmap-c)# cxsc fail-close auth-proxy ASA-FW(config-pmap-c)# exit
ASA-FW(config-pmap)# exit
The fail-close is needed as per instructions that if the CX module fails, no traffic should be allowed. The auth-proxy keyword is needed for active authentication.
Next, we need to apply this policy map to the inside interface: ASA-FW(config)#service-policy inside-policy interface inside. Finally, verify that the policy is active:
ASA-FW# show service-policy interface inside Interface inside:
Service-policy: inside-policy Class-map: class-default
Default QueueingCXSC: card status Up, mode fail-close, auth-proxy enabled Packet input 181, packet output 183, drop 0, reset-drop 0, proxied 0 Configuration guidelines can be found at this reference link:
Reference:
http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/modules_cx.pdf

NEW QUESTION 27

Which five system management protocols are supported by the Intrusion Prevention System? (Choose five.)

  • A. SNMPv2c
  • B. SNMPv1
  • C. SNMPv2
  • D. SNMPv3
  • E. syslog
  • F. SDEE
  • G. SMTP

Answer: ABCFG

NEW QUESTION 28

In the predefined URL category filtering configuration page in a cisco WSA, which two actions are valid?

  • A. Restrict
  • B. Guarantee
  • C. Block
  • D. Notification
  • E. Time based

Answer: AD

NEW QUESTION 29

Which three functions can Cisco Application Visibility and Control perform? (Choose three.)

  • A. Validation of malicious traffic
  • B. Traffic control
  • C. Extending Web Security to all computing devices
  • D. Application-level classification
  • E. Monitoring
  • F. Signature tuning

Answer: BDE

NEW QUESTION 30

What access control action will analyze the traffic as it passes through the device?

  • A. trust
  • B. Allow
  • C. Monitor
  • D. inspect

Answer: C

NEW QUESTION 31
......

Thanks for reading the newest 300-210 exam dumps! We recommend you to try the PREMIUM Passcertsure 300-210 dumps in VCE and PDF here: https://www.passcertsure.com/300-210-test/ (481 Q&As Dumps)


START 300-210 EXAM