exam questions

Exam 300-710 All Questions

View all questions & answers for the 300-710 exam

Exam 300-710 topic 1 question 112 discussion

Actual exam question from Cisco's 300-710
Question #: 112
Topic #: 1
[All 300-710 Questions]

A VPN user is unable to connect to web resources behind the Cisco FTD device terminating the connection. While troubleshooting, the network administrator determines that the DNS response are not getting through the Cisco FTD. What must be done to address this issue while still utilizing Snort IPS rules?

  • A. Uncheck the ג€Drop when Inlineג€ box in the intrusion policy to allow the traffic
  • B. Modify the Snort rules to allow legitimate DNS traffic to the VPN users
  • C. Disable the intrusion rule thresholds to optimize the Snort processing
  • D. Decrypt the packet after the VPN flow so the DNS queries are not inspected
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Initial14
8 months, 2 weeks ago
Selected Answer: B
The only answer here that is the closest to correct is B. All other can't be right. A--> You transform IPS to IDS, B ---> There might be some problems in request/reply in DNS communication and IPS will block it. C---> This does not make sense, if you disable Threshold, the rule will be triggered X times more. D ----> No sense in that
upvoted 4 times
...
Joe_Blue
9 months, 2 weeks ago
Selected Answer: B
To address the issue of DNS responses not getting through the Cisco FTD while still utilizing Snort IPS rules, the network administrator should modify the Snort rules to allow legitimate DNS traffic to the VPN users. Snort is an intrusion detection and prevention system that can be used to detect and prevent malicious traffic. However, in some cases, Snort rules may block legitimate traffic, such as DNS responses, causing connectivity issues for VPN users.
upvoted 4 times
...
tanri04
10 months, 1 week ago
correct answer???which?
upvoted 1 times
...
Baumb
10 months, 3 weeks ago
A. Uncheck the "Drop when Inline" box in the intrusion policy to allow the traffic -> Seems to be the best option, since it only will generate an event afterwards but lets the traffic pass B. Modify the Snort rules to allow legitimate DNS traffic to the VPN users -> Traffic is already allowed, as the response is not getting to the VPN user C. Disable the intrusion rule thresholds to optimize the Snort processing -> This doesnt make any sense for the shown problem D. Decrypt the packet after the VPN flow so the DNS queries are not inspected -> The packet is already decrypted, since the FTD is the vpn endpoint I would go with A
upvoted 1 times
...
netwguy
2 years, 3 months ago
All answers are a bit strange to me. We know that the DNS query is going through the firewall, since the problem is the DNS response not going through the firewall. B makes the most sense, but it would then be the DNS response that triggers the snort triggered drop(?). Thats a bit strange, but plausible.
upvoted 3 times
...
cryptofetti
2 years, 4 months ago
Sorry I mean why is the answer not D?
upvoted 1 times
...
cryptofetti
2 years, 4 months ago
Why would'nt it be B?
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...