exam questions

Exam 300-710 All Questions

View all questions & answers for the 300-710 exam

Exam 300-710 topic 1 question 65 discussion

Actual exam question from Cisco's 300-710
Question #: 65
Topic #: 1
[All 300-710 Questions]


Refer to the exhibit. An organization has an access control rule with the intention of sending all social media traffic for inspection. After using the rule for some time, the administrator notices that the traffic is not being inspected, but is being automatically allowed. What must be done to address this issue?

  • A. Add the social network URLs to the block list.
  • B. Change the intrusion policy to connectivity over security.
  • C. Modify the selected application within the rule.
  • D. Modify the rule action from trust to allow.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
4study
Highly Voted 2 years ago
Selected Answer: D
D is the correct answer as other have mentioned.
upvoted 8 times
...
majid94
Highly Voted 2 years, 5 months ago
D is 100% correct
upvoted 6 times
...
DID123
Most Recent 9 months, 4 weeks ago
Selected Answer: D
it's D 100%
upvoted 1 times
...
aaInman
1 year, 5 months ago
Selected Answer: D
D = 100% correct
upvoted 1 times
...
xziomal9
1 year, 5 months ago
Selected Answer: D
Correct answer is: D
upvoted 1 times
...
Reece_S
1 year, 6 months ago
C is correct. Any Applications selected are being allowed regardless if the action is trust or allow. If this was a Block rule, then putting the category Social would be correct. In this rule, everything except social will need to be selected for it to work. URL filtering actually needs a Block rule or in an Allow, allow everything except what you want to block.
upvoted 1 times
BorZol
1 year, 2 months ago
ur right. But it is application filtering not url. Check the screenshot.
upvoted 1 times
...
...
liqucika
1 year, 10 months ago
Selected Answer: D
Trust bypasses inspection. Allow will let traffic continue on for further inspection.
upvoted 2 times
...
Sarbi
2 years, 2 months ago
D is the correct answer.
upvoted 2 times
...
AS04
2 years, 4 months ago
D is correct, In general ACP- the action "allow" will send the traffic to the snort engine to inspect and in pre-filter the action "analyze" will send it to ACP.
upvoted 3 times
...
Bobster02
2 years, 6 months ago
Correct answer is D indeed. Rule 4: Allow is the final rule. For this rule, matching traffic is allowed; however, prohibited files, malware, intrusions, and exploits within that traffic are detected and blocked. Remaining non-prohibited, non-malicious traffic is allowed to its destination, though it is still subject to identity requirements and rate limiting. You can configure Allow rules that perform only file inspection, or only intrusion inspection, or neither. https://www.cisco.com/c/en/us/td/docs/security/firepower/660/configuration/guide/fpmc-config-guide-v66/access_control_rules.html
upvoted 4 times
...
michingon
2 years, 6 months ago
The right answer is "D"
upvoted 3 times
...
kakakayayaya
2 years, 6 months ago
Trust means no inspection. We need to allow traffic.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...