Proper study guides for Up to date Cisco Implementing Cisco Threat Control Solutions (SITCS) certified begins with Cisco 300-210 preparation products which designed to deliver the Highest Quality 300-210 questions by making you pass the 300-210 test at your first time. Try the free 300-210 demo right now.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for Cisco 300-210 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW 300-210 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/300-210-exam-dumps.html
Q1. Which two TCP ports can allow the Cisco Firepower Management Center to communication with FireAMP cloud for file disposition information? (Choose two.)
A. 8080
B. 22
C. 8305
D. 32137
E. 443
Answer: D E
Explanation
http://www.cisco.com/c/en/us/support/docs/security/sourcefire-fireamp-private-cloud-virtual-appliance/118336-
&pos=2&
page=http://www.cisco.com/c/en/us/support/docs/security/sourcefire-amp-appliances/118121-technote-sourcefir
Q2. Which type of server is required to communicate with a third-party DLP solution?
A. an ICAP-capable proxy server
B. a PKI certificate server
C. an HTTP server
D. an HTTPS server
Answer: A
Q3. On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?
A. health policy
B. system policy
C. correlation policy
D. access control policy
E. health awareness policy
Answer: A
Q4. In a Cisco FirePOWER instrusion policy, which two event actions can be configured on a rule? (Choose two.)
A. drop packet
B. drop and generate
C. drop connection
D. capture trigger packet
E. generate events
Answer: B
Q5.
Refer to the exhibit. Which option is a result of this configuration?
A. All ingress traffic on the inside interface that matches the access list is redirected.
B. All egress traffic on the outside interface that matches the access list is redirected.
C. All TCP traffic that arrives on the inside interface is redirected.
D. All ingress and egress traffic is redirected to the Cisco FirePOWER module.
Answer: C
Q6. What is a value that Cisco ESA can use for tracing mail flow?
A. the source IP address
B. the FQDN of the destination IP address
C. the destination IP address
D. the FQDN of the source IP address
Answer: D
Q7. In which two places can thresholding settings be configured? (Choose two.)
A. globally, per intrusion policy
B. globally, within the network analysis policy
C. on each access control rule
D. on each IPS rule
E. per preprocessor, within the network analysis policy
Answer: C D
Q8. With Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)
A. Speed
B. Duplex
C. Media Type
D. Redundant Interface
E. EtherChannel
Answer: A B
Q9. Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?
A. explicit forward mode
B. Layer 4 Traffic Monitor
C. transparent mode
D. Secure Web Proxy
Answer: B
Q10. Access the configuration of the Cisco Email Security Appliance using the MailFlowPolicies tab. Within the GUI, you can navigate between the Host Access Table Overview and Mail Flow Policies tables. You can also navigate to the individual Mail Flow Policies and Sender Groups that are configured on the appliance.
Consider the configuration and the SenderBase Reputation Scores of the following fictitious domains when answering the four multiple choice questions.
A. red.public, -6
B. orange.public, -4
C. yellow.public, -2
D. green. .public, 2
E. blue.public, 6
F. violet.public, 8
Answer: D
