exam questions

Exam 300-710 All Questions

View all questions & answers for the 300-710 exam

Exam 300-710 topic 1 question 52 discussion

Actual exam question from Cisco's 300-710
Question #: 52
Topic #: 1
[All 300-710 Questions]

In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)

  • A. Traffic inspection is interrupted temporarily when configuration changes are deployed.
  • B. The system performs intrusion inspection followed by file inspection.
  • C. They block traffic based on Security Intelligence data.
  • D. File policies use an associated variable set to perform intrusion prevention.
  • E. The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.
Show Suggested Answer Hide Answer
Suggested Answer: CE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
14a1949
1 week, 1 day ago
Selected Answer: CE
The correct answers are actually C and E: C. They block traffic based on Security Intelligence data. Access control policies on Cisco Firepower systems can block connections based on the latest IP address, URL, and domain name reputation intelligence. E. The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters. The system performs a preliminary inspection on trusted traffic to ensure it matches the trusted parameters before allowing it through. Option A is not correct because traffic inspection is not typically interrupted temporarily when configuration changes are deployed.
upvoted 1 times
...
gwb
5 months ago
I think the key is "Access Control Policies" here. A - "Changing the total number of intrusion policies used by an access control policy restarts the Snort process when you deploy configuration changes, temporarily interrupting traffic inspection." This is how ACP works along with Intrusion Policy. B - This is correct (ACL layer 3 -> SI -> ACL layer7 ->File policy -> Intrusion policy) Intrusion policy is after the file policy. However this is NOT relevant to ACP. C - SI can block the traffic, but this is NOT also relevant to ACP. D - File Policy and Intrusion Policy with variable set are for Inspection. So this should be like this "Intrusion policy use an associated variable set to perform inspection. E - Technically this is right before a packet goes into Snort from Firewall. But I count this as ACP behavior. So A and E
upvoted 1 times
...
Vlad_Is_Love_ua
11 months ago
Selected Answer: AC
"... Changing the total number of intrusion policies used by an access control policy restarts the Snort process when you deploy configuration changes, temporarily interrupting traffic inspection. Whether traffic drops during this interruption or passes without further inspection depends on how the target device handles traffic. ..." from this https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/getting_started_with_access_control_policies.html#ID-2176-00000027
upvoted 2 times
...
spambox730
1 year ago
Selected Answer: AC
Not B because file policy is before inspection policy Not D because variables belong to inspection policy Not E because there is zero inspection on trusted traffic That leaves it with A and C.
upvoted 1 times
...
Bbb78
1 year, 1 month ago
Selected Answer: CE
A is correct BUT the traffic is dropped - the way they worded this it looks like traffic is permitted - no, traffic is dropped. Still C and E are the other options for me.
upvoted 2 times
...
Joe_Blue
1 year, 4 months ago
Selected Answer: CE
C. They block traffic based on Security Intelligence data. E. The system performs a preliminary inspection on trusted traffic to validate that it matches the trusted parameters.
upvoted 2 times
ureis
1 year, 3 months ago
they do not perform a preliminary inspection on trusted traffic to validate parameters.
upvoted 1 times
...
...
xziomal9
2 years, 1 month ago
Selected Answer: AC
Correct answer is: A and C
upvoted 1 times
...
Markl3ver
2 years, 2 months ago
My opinion is A and B, Security inteligence it is another engine which blocks trafic by it self, not ACP block it with corresponding with SE
upvoted 1 times
japm1801
1 year, 11 months ago
SI doesn't block by itself, in fact, SI has to be configured under ACP to take effect, so A and C fit in this question
upvoted 1 times
...
...
SanchezEldorado
2 years, 2 months ago
Selected Answer: CE
C and E make the most sense to me. We're all agreed on C, but SNORT doesn't always restart when policies are deployed and it isn't a "way" that ACPs operate. A trust rule within an ACP will use parameters to specify traffic such as IP, Port, etc... The firewall does need to inspect traffic that much to see that the traffic is trusted and then allow it without further SNORT inspection.
upvoted 2 times
...
cewe
2 years, 4 months ago
Selected Answer: AC
like 4study explained
upvoted 1 times
...
4study
2 years, 8 months ago
It seems to be A and C When deploying changes SNORT can restart causing traffic interuptions --> https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/policy_management.html#reference_F11C552688424DEF85ED145FA97283B7 I disagree with D because File policies don't make use of Variable sets, those are used for Intrusion policies.
upvoted 3 times
...
Sarbi
2 years, 9 months ago
The correct answer is C and D.A does not make any sense to be correct.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago