Q1. An engineer must create an access control policy on a Cisco Secure Firewall Threat Defense device. The company has a contact center that utilizes VoIP heavily, and it is critical that this traffic is not .... by performance issues after deploying the access control policy Which access control Action rule must be configured to handle the VoIP traffic?
A.monitor
B. trust
C. block
D. allow
Correct Answer: B
Q2. Which action must be taken to configure an isolated bridge group for IRB mode on a Cisco Secure Firewall device?
A.Add the restricted segment to the ACL.
B. Leave BVI interface name empty.
C. Define the NAT pool for the blocked traffic.
D. Remove the route from the routing table.
Correct Answer: B
Q3. What is the result when two users modify a VPN policy at the same lime on a Cisco Secure Firewall Management Center managed device?
A.Both users can edit the policy arid the last saved configuration persists.
B. The first user locks the configuration when selecting edit on the policy.
C. The changes from both users will be merged together into the policy.
D. The system prevents modifications to the policy by multiple users.
Correct Answer: B
Q4. An engineer must change the mode of a Cisco Secure Firewall Threat Defense (FTD) firewall in the Cisco Secure Firewall Management Center (FMC) inventory. The engineer must take these actions: * Register Secure FTD with Secure FMC. * Change the firewall mode. * Deregister the Secure FTD device from Secure FMC. How must the engineer take FTD take the actions?
A.Reload the Secure FTD device.
B. Configure the management IP address.
C. Access the Secure FTD CLI from the console port.
D. Erase the Secure FTD configuration
Correct Answer: C
$ 39
Reviews
There are no reviews yet.