New 300-210 exam questions from PassLeader 300-210 dumps! Welcome to download the newest PassLeader 300-210 VCE and PDF dumps: http://www.passleader.com/300-210.html (383 Q&As –> 428 Q&As –> 467 Q&As)
P.S. Free 300-210 dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=0B-ob6L_QjGLpTkN0N2xZSHZKY2s
Your organization has subscribed to the Cisco Cloud Web Security (CWS) service. You have been assigned the task of configuring the CWS connector on the ISR-G2 router at a branch office. Details of the configuration requirements include:
– Content scanning should be enabled for traffic outbound from FastEthernet0/1.
– Explicitly specify 8080 for both the http and the https ports.
– The primary CWS proxy server is proxy-a.scansafe.net.
– The secondary CWS proxy server is proxy-b.scansafe.net.
– The unencrypted license key is 0123456789abcdef.
– If the CWS proxy servers are not available, web traffic from the branch office should be denied.
– After configuration, use show commands to verify connectivity with the CWS service and scan activity.
You can access the console of the ISR at the branch office using the icon on the topology display. The enable password is Cisco!23
With Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)
C. Media Type
D. Redundant Interface
Which Cisco AMP for Endpoints, what, is meant by simple custom detection?
A. It is a rule for identifying a file that should be whitelisted by Cisco AMP.
B. It is a method for identifying and quarantining a specific file by its SHA-256 hash.
C. It is a feature for configuring a personal firewall.
D. It is a method for identifying and quarantining a set of files by regular expression language.
Which feature of the Cisco Hybrid Email Security services enables you to create multiple email senders on a single Cisco ESA?
A. Email Marketing Connector
B. Virtual Routing and Forwarding
C. Virtual Gateway
D. Mail Flow Policy Connector
E. Sender Groups
Which option lists the minimum requirements to deploy a managed device inline?
A. passive interface, security zone, MTU, and link mode.
B. passive interface, MTU, MDI/MDIX, and link mode.
C. inline interfaces, MTU, MDI/MDIX, and link mode.
D. inline interfaces, security zones, MTU, and link mode.
Which two methods are used to deploy transparent mode traffic redirection? (Choose two.)
A. Microsoft GPO
B. policy-based routing
C. DHCP server
D. PAC files
E. Web Cache Communication Protocol
When deploying Cisco FirePOWER appliances, which option must you configure to enable VLAN rewriting?
A. hybrid interfaces
B. virtual switch
C. virtual router
D. inline set
Which policy must you edit to make changes to the Snort preprocessors?
A. access control policy
B. network discovery policy
C. intrusion policy
D. file policy
E. network analysis policy
Which three access control actions permit traffic to pass through the device when using Cisco FirePOWER? (Choose three.)
Which two TCP ports can allow the Cisco Firepower Management Center to communication with FireAMP cloud for file disposition information? (Choose two.)
When creating an SSL policy on Cisco FirePOWER, which three options do you have?
A. do not decrypt
D. block with reset