Question 116

Which two routing options are valid with Cisco Firepower Threat Defense? (Choose two.)
  • Question 117

    Which protocol establishes network redundancy in a switched Firepower device deployment?
  • Question 118

    An engineer is troubleshooting application failures through a FTD deployment. While using the FMC CLI. it has been determined that the traffic in question is not matching the desired policy. What should be done to correct this?
  • Question 119

    In which two ways do access control policies operate on a Cisco Firepower system? (Choose two.)
  • Question 120

    A security engineer is configuring an Access Control Policy for multiple branch locations. These locations share a common rule set and utilize a network object called INSIDE_NET which contains the locally significant internal network subnets at each location. What technique will retain the policy consistency at each location but allow only the locally significant network subnet within the application rules?