Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-710 Topic 6 Question 72 Discussion

Actual exam question for Cisco's 300-710 exam
Question #: 72
Topic #: 6
[All 300-710 Questions]

A network engineer must configure IPS mode on a Cisco Secure firewall Threat Defense device to inspect traffic and act as an IDS. The engineer already configured the passive-interface on the secure firewall threat Defence device and SPAN on the switch. What must be configured next by the engineer?

Show Suggested Answer Hide Answer
Suggested Answer: C

https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/system_configuration.html#ID-2241-00000551

''You cannot send backups to one remote system and reports to another, but you can choose to send either to a remote system and store the other on the Firepower Management Center.''


Contribute your Thoughts:

Twana
7 days ago
DHCP on the switch? Really? I don't think that's related to setting up the IPS at all. Let's focus on the actual networking configuration here.
upvoted 0 times
...
Irma
18 days ago
I'm more worried about configuring the SPAN port correctly. Without that, the traffic won't even reach the firewall for inspection.
upvoted 0 times
...
Hyman
22 days ago
I agree with Gussie. The intrusion policy is crucial for the IPS to start inspecting and taking action on the traffic.
upvoted 0 times
...
Tracie
23 days ago
I believe active Interface on the Secure Firewall Threat Defense device should be configured next for IPS mode.
upvoted 0 times
...
Gussie
24 days ago
Definitely option A, intrusion policy. That's the key step to actually enable the IPS functionality on the Secure Firewall Threat Defense device.
upvoted 0 times
...
Emily
26 days ago
I agree with Domonique, configuring intrusion policy is necessary for IPS mode.
upvoted 0 times
...
Domonique
30 days ago
I think the next step is to configure intrusion policy on the Secure Firewall Threat Defense device.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77