Which two deployment types support high availability? (Choose two.)
A. transparent
B. routed
C. clustered
D. intra-chassis multi-instance
E. virtual appliance in public cloud
Which two dynamic routing protocols are supported in FirePower Threat Defense v6.0? (Choose Two)
A. IS-IS
B. BGP
C. OSPF
D. static routing
E. EIGRP
A security engineer must configure a Cisco FTD appliance to inspect traffic coming from the internet. The Internet traffic will be mirrored from the Cisco Catalyst 9300 Switch. Which configuration accomplishes the task?
A. Set interface configuration mode to none.
B. Set the firewall mode to transparent.
C. Set the firewall mode to routed.
D. Set interface configuration mode to passive.
A network administrator registered a new FTD to an existing FMC. The administrator cannot place the FTD in transparent mode. Which action enables transparent mode?
A. Add a Bridge Group Interface to the FTD before transparent mode is configured.
B. Dereglster the FTD device from FMC and configure transparent mode via the CLI.
C. Obtain an FTD model that supports transparent mode.
D. Assign an IP address to two physical interfaces.
Due to an Increase in malicious events, a security engineer must generate a threat report to include intrusion events, malware events, and security intelligence events. How Is this information collected in a single report?
A. Run the default Firepower report.
B. Export the Attacks Risk report.
C. Generate a malware report.
D. Create a Custom report.
A network administrator is configuring an FTD in transparent mode. A bridge group is set up and an access policy has been set up to allow all IP traffic. Traffic is not passing through the FTD. What additional configuration is needed?
A. An IP address must be assigned to the BVI.
B. The security levels of the interfaces must be set.
C. A default route must be added to the FTD.
D. A mac-access control list must be added to allow all MAC addresses.
A security analyst must create a new report within Cisco FMC to show an overview of the daily attacks, vulnerabilities, and connections. The analyst wants to reuse specific dashboards from other reports to create this consolidated one. Which action accomplishes this task?
A. Copy the Malware Report and modify the sections to pull components from other reports.
B. Create a new dashboard object via Object Management to represent the desired views.
C. Use the import feature in the newly created report to select which dashboards to add.
D. Modify the Custom Workflows within the Cisco FMC to feed the desired data into the new report.
A network administrator has converted a Cisco FTD from using LDAP to LDAPS for VPN authentication. The Cisco FMC can connect to the LDAPS server, but the Cisco FTD is not connecting. Which configuration must be enabled on the Cisco FTD?
A. The LDAPS must be allowed through the access control policy.
B. The RADIUS server must be defined.
C. SSL must be set to a use TLSv1.2 or lower.
D. DNS servers must be defined for name resolution.
A company is deploying AMP private cloud. The AMP private cloud instance has already been deployed by the server administrator. The server administrator provided the hostname of the private cloud instance to the network engineer via email. What additional information does the network engineer require from the server administrator to be able to make the connection to the AMP private cloud in Cisco FMC?
A. SSL certificate for the AMP private cloud instance
B. Username and password to the AMP private cloud instance
C. IP address and port number for the connection proxy
D. Internet access for the AMP private cloud to reach the AMP public cloud
What is the role of realms in the Cisco ISE and Cisco FMC integration?
A. Cisco Secure Firewall VDC
B. Cisco ISE context
C. TACACS+ database
D. AD definition