<< Prev Question Next Question >>

Question 128/138

With Cisco FTD integrated routing and bridging, which interface does the bridge group use to communicate with a routed interface?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (138q)
Question 1: DRAG DROP Drag and drop the steps to restore an automatic de...
Question 2: Drag and drop the steps to restore an automatic device regis...
Question 3: After deploying a network-monitoring tool to manage and moni...
Question 4: An engineer is configuring a cisco FTD appliance in IPS-only...
Question 5: Which two statements about bridge-group interfaces in Cisco ...
Question 6: Which interface type allows packets to be dropped?...
Question 7: An organization must be able to ingest NetFlow traffic from ...
Question 8: Which object type supports object overrides?...
Question 9: Which two actions can be used in an access control policy ru...
Question 10: How many report templates does the Cisco Firepower Managemen...
Question 11: An engineer is tasked with deploying an internal perimeter f...
Question 12: Which Cisco Firepower rule action displays an HTTP warning p...
Question 13: What is the maximum SHA level of filtering that Threat Intel...
Question 14: Which command is run on an FTD unit to associate the unit to...
Question 15: Drag and drop the steps to restore an automatic device regis...
Question 16: With Cisco Firepower Threat Defense software, which interfac...
Question 17: An engineer is configuring a cisco FTD appliance in IPS-only...
Question 18: Which command-line mode is supported from the Cisco Firepowe...
Question 19: Which two statements about bridge-group interfaces in Cisco ...
Question 20: What are the minimum requirements to deploy a managed device...
Question 21: Which Cisco Firepower feature is used to reduce the number o...
Question 22: An engineer has been tasked with using Cisco FMC to determin...
Question 23: An engineer is configuring a second Cisco FMC as a standby d...
Question 24: Which two deployment types support high availability? (Choos...
Question 25: Which two routing options are valid with Cisco Firepower Thr...
Question 26: Refer to the exhibit. (Exhibit) An organization has an acces...
Question 27: A network engineer is configuring URL Filtering on Firepower...
Question 28: Which firewall design allows a firewall to forward traffic a...
Question 29: An organization is migrating their Cisco ASA devices running...
Question 30: With Cisco FTD software, which interface mode must be config...
Question 31: An engineer is building a new access control policy using Ci...
Question 32: An engineer is attempting to create a new dashboard within t...
Question 33: A network administrator is concerned about (he high number o...
Question 34: What is the maximum bit size that Cisco FMC supports for HTT...
Question 35: An engineer is troubleshooting a device that cannot connect ...
Question 36: A security engineer is configuring an Access Control Policy ...
Question 37: What is a valid Cisco AMP file disposition?...
Question 38: A security engineer is configuring an Access Control Policy ...
Question 39: An engineer is setting up a new Firepower deployment and is ...
Question 40: Which two routing options are valid with Cisco FTD? (Choose ...
Question 41: Which command-line mode is supported from the Cisco FMC CLI?...
Question 42: An engineer is setting up a new Firepower deployment and is ...
Question 43: A network administrator reviews the file report for the last...
Question 44: An analyst is reviewing the Cisco FMC reports for the week. ...
Question 45: An administrator is attempting to remotely log into a switch...
Question 46: A network administrator configured a NAT policy that transla...
Question 47: Which protocol establishes network redundancy in a switched ...
Question 48: Drag and drop the steps to restore an automatic device regis...
Question 49: A network security engineer must replace a faulty Cisco FTD ...
Question 50: The event dashboard within the Cisco FMC has been inundated ...
Question 51: An organization wants to secure traffic from their branch of...
Question 52: In which two places can thresholding settings be configured?...
Question 53: An organization has a compliancy requirement to protect serv...
Question 54: In which two ways do access control policies operate on a Ci...
Question 55: A Cisco FTD device is running in transparent firewall mode w...
Question 56: Which CLI command is used to generate firewall debug message...
Question 57: A Cisco FTD device is running in transparent firewall mode w...
Question 58: A network administrator notices that remote access VPN users...
Question 59: Which Cisco Advanced Malware Protection for Endpoints policy...
Question 60: Which two dynamic routing protocols are supported in Firepow...
Question 61: A network administrator is seeing an unknown verdict for a f...
Question 62: Refer to the exhibit. (Exhibit) An administrator is looking ...
Question 63: An engineer currently has a Cisco FTD device registered to t...
Question 64: An organization has seen a lot of traffic congestion on thei...
Question 65: An engineer integrates Cisco FMC and Cisco ISE using pxGrid....
Question 66: Which two types of objects are reusable and supported by Cis...
Question 67: What is the maximum bit size that Cisco FMC supports for HTT...
Question 68: An engineer has been tasked with using Cisco FMC to determin...
Question 69: An engineer configures a network discovery policy on Cisco F...
Question 70: Which command should be used on the Cisco FTD CLI to capture...
Question 71: A company is in the process of deploying intrusion preventio...
Question 72: Which CLI command is used to generate firewall debug message...
Question 73: A network administrator notices that inspection has been int...
Question 74: When do you need the file-size command option during trouble...
Question 75: What is a result of enabling Cisco FTD clustering?...
Question 76: administrator is configuring SNORT inspection policies and i...
Question 77: Which two OSPF routing features are configured in Cisco FMC ...
Question 78: What is the difference between inline and inline tap on Cisc...
Question 79: Refer to the exhibit. (Exhibit) An organization has an acces...
Question 80: A network administrator is configuring Snort inspection poli...
Question 81: Refer to the exhibit. (Exhibit) An engineer is modifying an ...
Question 82: Which interface type allows packets to be dropped?...
Question 83: A mid-sized company is experiencing higher network bandwidth...
Question 84: With Cisco FTD software, which interface mode must be config...
Question 85: Which command should be used on the Cisco FTD CLI to capture...
Question 86: Which two conditions are necessary for high availability to ...
Question 87: Which Cisco Firepower rule action displays an HTTP warning p...
Question 88: Which CLI command is used to control special handling of Cli...
Question 89: An engineer is using the configure manager add &lt;FMC IP&gt...
Question 90: administrator is configuring SNORT inspection policies and i...
Question 91: Which two packet captures does the FTD LINA engine support? ...
Question 92: Which action should be taken after editing an object that is...
Question 93: Which Cisco Firepower feature is used to reduce the number o...
Question 94: A network engineer wants to add a third-party threat feed in...
Question 95: What is the maximum SHA level of filtering that Threat Intel...
Question 96: Drag and drop the steps to restore an automatic device regis...
Question 97: On the advanced tab under inline set properties, which allow...
Question 98: In which two places can thresholding settings be configured?...
Question 99: An engineer is implementing Cisco FTD in the network and is ...
Question 100: What is the role of the casebook feature in Cisco Threat Res...
Question 101: Which command is entered in the Cisco FMC CLI to generate a ...
Question 102: Which two deployment types support high availability? (Choos...
Question 103: Which policy rule is included in the deployment of a local D...
Question 104: Which limitation applies to Cisco FMC dashboards in a multi-...
Question 105: Which CLI command is used to control special handling of Cli...
Question 106: What is a feature of Cisco AMP private cloud?...
Question 107: Which firewall design allows a firewall to forward traffic a...
Question 108: What is the result of specifying of QoS rule that has a rate...
Question 109: What are the minimum requirements to deploy a managed device...
Question 110: An engineer is attempting to add a new FTD device to their F...
Question 111: A security engineer is configuring a remote Cisco FTD that h...
Question 112: Refer to the exhibit. (Exhibit) An administrator is looking ...
Question 113: An organization is using a Cisco FTD and Cisco ISE to perfor...
Question 114: While integrating Cisco Umbrella with Cisco Threat Response,...
Question 115: Which action should you take when Cisco Threat Response noti...
Question 116: A VPN user is unable to conned lo web resources behind the C...
Question 117: Which Cisco Advanced Malware Protection for Endpoints policy...
Question 118: Which two remediation options are available when Cisco FMC i...
Question 119: An organization wants to secure traffic from their branch of...
Question 120: Which command is run on an FTD unit to associate the unit to...
Question 121: Refer to the exhibit. (Exhibit) What must be done to fix acc...
Question 122: What are two application layer preprocessors? (Choose two.)...
Question 123: How many report templates does the Cisco Firepower Managemen...
Question 124: Which two statements about deleting and re-adding a device t...
Question 125: An administrator must use Cisco FMC to install a backup rout...
Question 126: An engineer has been tasked with providing disaster recovery...
Question 127: Which limitation applies to Cisco Firepower Management Cente...
Question 128: With Cisco FTD integrated routing and bridging, which interf...
Question 129: The event dashboard within the Cisco FMC has been inundated ...
Question 130: What is the disadvantage of setting up a site-to-site VPN in...
Question 131: A security engineer is configuring an Access Control Policy ...
Question 132: Refer to the exhibit. (Exhibit) An administrator is looking ...
Question 133: After using Firepower for some time and learning about how i...
Question 134: Which command is entered in the Cisco FMC CLI to generate a ...
Question 135: In which two ways do access control policies operate on a Ci...
Question 136: Refer to the exhibit. (Exhibit) An administrator is looking ...
Question 137: An administrator is setting up Cisco Firepower to send data ...
Question 138: What is the maximum SHA level of filtering that Threat Intel...