Exam Code: 300-210 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Implementing Cisco Threat Control Solutions (SITCS)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 300-210 Exam.
Q1. The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs).
The simulator will provide access to the graphical user interfaces of one Cisco ASA and one Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are implemented in the simulator. The options that have been implemented are sufficient to determine the best answer to each of the questions that are presented.
Your task is to examine the details available in the simulated graphical user interfaces and select the best answer.
Between the Cisco ASA configuration and the Cisco WSA configuration, what is true with respect to redirected ports?
A. Both are configured for port 80 only.
B. Both are configured for port 443 only.
C. Both are configured for both port 80 and 443.
D. Both are configured for ports 80, 443 and 3128.
E. There is a configuration mismatch on redirected ports.
Answer: C
Explanation
This can be seen from the WSA Network tab shown below:
Q2. Which CLI command is used to generate firewall debug messages on a Cisco FirePOWER sensor?
A. system support ssl-debug
B. system support firewall-engine-debug
C. system support capture-traffic
D. system support platform
Answer: C
Q3. What is the maximum message size that the Cisco Email Security Appliance will accept from the violet.public domain?
A. 1 KB
B. 100 KB
C. 1 MB
D. 10 MB
E. 100 MB
F. Unlimited
Answer: D
Q4. Which Cisco AMP for Endpoints, what, is meant by simple custom detection?
A. It is a rule for identifying a file that should be whitelisted by Cisco AMP.
B. It is a method for identifying and quarantining a specific file by its SHA-256 hash.
C. It is a feature for configuring a personal firewall.
D. It is a method for identifying and quarantining a set of files by regular expression language.
Answer: A
Q5. Which detection method is also known as machine learning on Network-based Cisco Advanced Malware Protection?
A. custom file detection
B. hashing
C. Spero engine
D. dynamic analysis
Answer: D
Q6. Which option lists the minimum requirements to deploy a managed device inline?
A. passive interface, security zone, MTU, and link mode.
B. passive interface, MTU, MDI/MDIX, and link mode.
C. inline interfaces, MTU, MDI/MDIX, and link mode.
D. inline interfaces, security zones, MTU, and link mode.
Answer: A
Q7. Which three access control actions permit traffic to pass through the device when using Cisco FirePOWER? (Choose three.)
A. pass
B. trust
C. monitor
D. allow
E. permit
F. inspect
Answer: B C D
Explanation
http://www.cisco.com/c/en/us/td/docs/security/firesight/541/user-guide/FireSIGHT-System-UserGuide-v5401/A
Q8. Which three operating systems are supported with Cisco AMP for Endpoints? (Choose three.)
A. Windows
B. AWS
C. Android
D. Cisco IOS
E. OS X
F. ChromeOS
Answer: A C E
Explanation
http://www.cisco.com/c/en/us/products/security/fireamp-endpoints/index.html