Cisco 300-210 - CCNP Security Implementing Cisco Threat Control Solutions Exam

Question #6 (Topic: Topic 1)
Which three protocols are required when considering firewall rules for email services using a Cisco Email Security Appliance? (Choose three.)
A. HTTP B. SMTP C. TFTP D. FTP E. DNS F. SNMP
Answer: ABE
Question #7 (Topic: Topic 1)
What are two arguments that can be used with the show content-scan command in Cisco IOS software? (Choose two.)
A. data B. session C. buffer D. statistics E. verbose
Answer: BD
Question #8 (Topic: Topic 1)
Which CLI command is used to generate firewall debug messages on a Cisco FirePOWER sensor?
A. system support ssl-debug B. system support firewall-engine-debug C. system support capture-traffic D. system support platform
Answer: B
Question #9 (Topic: Topic 1)
What is a difference between a Cisco Content Security Management virtual appliance and a physical appliance?
A. Migration between virtual appliances of varying sizes is possible, but physical appliances must be of equal size. B. The virtual appliance requires an additional license to run on a host. C. The physical appliance requires an additional license to activate its adapters. D. The physical appliance is configured with a DHCP-enabled management port to receive an IP address automatically, but you must assign the virtual appliance an IP address manually in your management subnet.
Answer: B
Question #10 (Topic: Topic 1)
Which Cisco technology secures the network through malware filtering, category-based control, and reputation-based control?
A. Cisco ASA 5500 Series appliances B. Cisco IPS C. Cisco remote-access VPNs D. Cisco WSA
Answer: D
Download Exam
Page: 2 / 91
Total 451 questions