exam questions

Exam 300-710 All Questions

View all questions & answers for the 300-710 exam

Exam 300-710 topic 1 question 176 discussion

Actual exam question from Cisco's 300-710
Question #: 176
Topic #: 1
[All 300-710 Questions]

A network administrator wants to block traffic to a known malware site at https:/www.badsite.com and all subdomains while ensuring no packets from any internal client are sent to that site. Which type of policy must the network administrator use to accomplish this goal?

  • A. Access Control policy with URL filtering
  • B. Prefilter policy
  • C. DNS policy
  • D. SSL policy
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
d0980cc
3 days, 9 hours ago
Selected Answer: D
I first thought, A but it will not block subdomains. Correct answer is C https://www.cisco.com/c/en/us/support/docs/security/firepower-management-center/214852-block-dns-with-security-intelligence-usi.html#:~:text=DNS%20blacklisting%20with%20SI%20can%20focus%20on%20domains%20like%20%E2%80%9Ccisco.com%E2%80%9D%20without%20the%20need%20to%20worry%20about%20any%20sub%2Ddomains%20or%20changes%20in%20URL.
upvoted 1 times
...
Silexis
1 month, 3 weeks ago
Selected Answer: C
I will go with C because: "If you plan to use a URL object to match HTTPS traffic in an access control rule, create the object using the subject common name in the public key certificate used to encrypt the traffic. Also, the system disregards subdomains within the subject common name, so do not include subdomain information. For example, use example.com rather than www.example.com. However, please understand that the subject common name in the certificate might be completely unrelated to a web site’s domain name. For example, the subject common name in the certificate for youtube.com is *.google.com (this of course might change at any time). You will get more consistent results if you use the SSL Decryption policy to decrypt HTTPS traffic so that URL filtering rules work on decrypted traffic. Note URL objects will not match HTTPS traffic if the browser resumes a TLS session because the certificate information is no longer available. Thus, even if you carefully configure the URL object, you might get inconsistent results for HTTPS connections. "
upvoted 1 times
...
TRVB
5 months, 3 weeks ago
Selected Answer: A
AC with URL.
upvoted 1 times
...
squirrelzzz
8 months, 1 week ago
Selected Answer: C
Takes 3 packets to identify url
upvoted 2 times
...
MB2222
11 months, 1 week ago
Answer (C) would be it since the keywords of this questions are: URL + subdomains to be blocked.
upvoted 1 times
MB2222
11 months ago
So, I guess that the DNS policy is the correct approach to answer this question correctly: https://community.cisco.com/t5/web-security/block-tld-s-top-level-domains/td-p/4556412
upvoted 1 times
...
...
gwb
1 year ago
In real work, we don't use DNS policy to block certain URL. Only URL filtering (or Umbrella) through FTD is doable. so my answer is A
upvoted 1 times
...
SegaMasterSystemAdmin
1 year, 9 months ago
Selected Answer: C
Tricky questions as both A and C will block but with C the endpoints won't even get the DNS query so I will go with C
upvoted 1 times
...
bobie
1 year, 10 months ago
Selected Answer: C
I'll go to C because the DNS query occurs first.
upvoted 1 times
...
Gabranch
1 year, 10 months ago
Selected Answer: C
Hard requirement to not permit ANY packets from internal clients from reaching the site in the question. Regarging ACP URL Filters: "It takes 3 to 5 packets for the system to identify the application or URL in a connection. Thus, the correct access control rule might not be matched immediately for a given connection. However, once the application/URL is known, the connection is handled based on the matching rule. For encrypted connections, this happens after the server certificate exchange in the SSL handshake." https://www.cisco.com/c/en/us/td/docs/security/firepower/623/fdm/fptd-fdm-config-guide-623/fptd-fdm-access.html#concept_AA0463A9912F4868B33694E7C0C5648A Means a DNS Policy with a manually-created custom list is likely it.
upvoted 3 times
Shortbusruss
1 year, 9 months ago
Good point, but the problem with this is.. DNS lookup caching. Any client that has previously gotten a DNS response for the site in question, will be able to reach the site until the entry for this site in DNS times out. Neither A nor B meets the hard requirement to absolutely prevent ANY packets from any internal client to the site. That being said... Your "3 to 5 packets" comment does convince me that the exam question writers "intended" C. DNS Policy as the answer, even though it does not meet the requirement.
upvoted 3 times
Shortbusruss
1 year, 9 months ago
And let's not even go into the fact that you can put a manual entry in your local hosts file that pretty much neuters the FTD DNS policy.
upvoted 2 times
...
...
...
saad_SEIU
1 year, 11 months ago
Selected Answer: C
known bad side, Subdomains, and the packets should not go out. Actually we can achieve this in many ways but for me here, it is DNS.
upvoted 1 times
...
Initial14
1 year, 11 months ago
Selected Answer: A
The key here is " and all subdomains". Only with URL filtering can you for example filter all possible subdomains of www.badsite.com. For EX: .badsite.com will match any site with domein .badsite.com, so malware.badsite.com, crypto.badsite.com,...
upvoted 2 times
Cokamaniako
1 year, 10 months ago
If you block the domain through DNS policy, you block all domains too.
upvoted 2 times
...
...
Joe_Blue
2 years ago
Selected Answer: A
an Access Control policy with URL filtering is the most appropriate solution for blocking traffic to a known malware site and its subdomains. This policy allows the network administrator to set rules that specify which traffic is allowed or denied based on factors such as source IP address, destination IP address, protocol, and URL filtering.
upvoted 2 times
...
matan24
2 years ago
Selected Answer: A
Therefore, while a DNS policy can be an effective tool for blocking access to certain types of sites, an Access Control Policy with URL Filtering is a more comprehensive solution for blocking access to a known malware site and ensuring that no packets from any internal client are sent to that site."
upvoted 2 times
...
freho
2 years, 1 month ago
Selected Answer: A
Only A is possible.
upvoted 2 times
...
Mevijil
2 years, 1 month ago
Selected Answer: C
I believe C is correct - key phrase here is "known bad site"
upvoted 2 times
freho
2 years, 1 month ago
Correct me, but you can only add feeds to the dns-policy. there is no way to add the specific url. you can do that either with the security intelligence - that is no option here, or with your standard acp. so ACP is the only valid answer.
upvoted 2 times
...
THEODORABLE
1 year, 10 months ago
I leaned towards C also using the same question logic but after some review of the comments, they are asking for a specific site name that they know. there is no guarantee the the domain is listed in a feed update even they they state "known bad site". I think if you spin the emphasis on how the question is written they are saying " we know the name of a specific site, and we want to block it specifically"; not hope that it is advertised with the feed.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago