Part 3
Part 3
Question 1
An engineer is configuring a Cisco Secure Firewall Threat Defense device managed by Cisco Secure Firewall
Management Center. The device must have SSH enabled and be accessible from the inside interface for remote
administration. Which type of policy must the engineer configure to accomplish this?
A. prefilter
B. identity
C. access control
D. platform settings
Question 2
Remote users who connect via Cisco AnyConnect to the corporate network behind a Cisco FTD device report that they
get no audio when calling between remote users using their softphones. These same users can call internal users on
the corporate network without any issues. What is the cause of this issue?
Question 3 An engineer is configuring multiple Cisco FTD appliances for use in the network. Which rule must the
engineer follow while defining interface objects in Cisco FMC for use with interfaces across multiple devices?
Question 4 An engineer is troubleshooting a device that cannot connect to a web server. The connection is initiated
from the Cisco FTD inside interface and attempting to reach [Link] over the non-standard port of 9443 The host
the engineer is attempting the connection from is at the IP address of [Link]. In order to determine what is
happening to the packets on the network, the engineer decides to use the FTD packet capture tool Which capture
configuration should be used to gather the information needed to troubleshoot this issue?
Option A
[Link] 1/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Option B
Option C
[Link] 2/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Option D
A. Option A
B. Option B
C. Option C
D. Option D
[Link] 3/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Question 5
A security engineer must create a malware and file policy on a Cisco Secure Firewall Threat Defense device. The
solution must ensure that PDF, DOCX, and XLSX files are not sent to Cisco Secure Malware Analytics. What must be
configured to meet the requirements?
Question 6
An engineer must investigate a connectivity issue from an endpoint behind a Cisco FTD device and a public DNS server.
The endpoint cannot perform name resolution queries. Which action must the engineer perform to troubleshoot the
issue by simulating real DNS traffic on the Cisco FTD while verifying the Snort verdict?
Question 7 A network engineer is deploying a Cisco Firepower 4100 appliance and must configure a multi-instance
environment for high availability. Drag and drop the actions from the left into sequence on the right for this
configuration.
Note: You just need to click on one of the boxes on the right to match it with the corresponding box on the left.
Configure interfaces
1 5 4
3 2
3 2
3 2
[Link] 4/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Question 8 A Cisco Secure Firewall Threat Defense device is configured in inline IPS mode to inspect all traffic that
passes through the interfaces in the inline set. Which setting in the inline set configuration must be selected to allow
traffic to pass through uninterrupted when VDB updates are being applied?
Question 9
Cisco SecureX is classified as which type of threat detection and response solution?
A. MDR
B. NDR
C. EDR
D. XDR
Question 10
An engineer is configuring a custom intrusion rule on Cisco FMC. The engineer needs the rule to search the payload or
stream for the string “|44 78 97 13 2 0A|”. Which keyword must the engineer use with this string to create an
argument for packet inspection?
A. metadata
B. protected_content
C. content
D. data
Question 11
A network engineer must configure IPS mode on a Secure Firewall Threat Defense device to inspect traffic and act as
an IDS. The engineer already configured the passive-interface on the Secure Firewall Threat Defense device and SPAN
on the switch. What must be configured next by the engineer?
Question 12
A network engineer is planning on deploying a Cisco Secure Firewall Threat Defense Virtual appliance in transparent
mode. Which two virtual environments support this configuration? (Choose two)
A. KVM
B. ESXi
[Link] 5/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
C. GCP
D. OSI
E. AWS
Question 13
What is the result when two users modify a VPN policy at the same time on a Cisco Secure Firewall Management
Center managed device?
A. The first user locks the configuration when selecting edit on the policy
B. Both users can edit the policy and the last saved configuration persists
C. The changes from both users will be merged together into the policy
D. The system prevents modifications to the policy by multiple users
Question 14
Cisco Security Analytics and Logging SaaS licenses come with how many days of data retention by default?
A. 120
B. 365
C. 90
D. 60
Question 15
A Cisco FMC administrator wants to configure fastpathing of trusted network traffic to increase performance. In which
type of policy would the administrator configure this feature?
A. Identity policy
B. Prefilter policy
C. Intrusion policy
D. Network Analysis policy
Question 16
An organization is installing a new Cisco FTD appliance in the network. An engineer is tasked with configuring access
between two network segments within the same IP subnet. Which step is needed to accomplish this task?
Question 17
[Link] 6/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
An engineer is configuring two new Cisco FTD devices to replace the existing high availability firewall pair in a highly
secure environment. The information exchanged between the FTD devices over the failover link must be encrypted.
Which protocol supports this on the Cisco FTD?
A. SSL
B. MACsec
C. IPsec
D. SSH
Question 18
An engineer must configure the firewall to monitor traffic within a single subnet without increasing the hop count of
that traffic. How would the engineer achieve this?
Question 19
Which file format can standard reports from Cisco Secure Firewall Management Center be downloaded in?
A. xls
B. doc
C. csv
D. ppt
Question 20
A security engineer must configure a Cisco FTD appliance to inspected traffic coming from the internet. The internet
traffic will be mirrored from the Cisco Catalyst 9300 Switch. Which configuration accomplishes the task?
Question 21
A security engineer needs to configure a network discovery policy on a Cisco FMC appliance and prevent excessive
network discovery events from overloading the FMC database. Which action must be taken to accomplish this task?
Question 22
An engineer is configuring a custom application detector for HTTP traffic and wants to import a file that was provided
by a third party. Which type of files are advanced application detectors creates and uploaded as?
A. Perl script
[Link] 7/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
B. NBAR protocol
C. LUA script
D. Python program
Question 23 Which action must be taken on the Cisco FMC when a packet bypass is configured in case the Snort
engine is down or a packet takes too long to process?
Question 24
When using Cisco Threat Response, which phase of the Intelligence Cycle publishes the results of the investigation?
A. analysis
B. direction
C. processing
D. dissemination
Question 25
An engineer defines a new rule while configuring an Access Control Policy. After deploying the policy, the rule is not
working as expected and the hit counters associated with the rule are showing zero. What is causing this error?
A. The wrong source interface for Snort was selected in the rule.
B. Logging is not enabled for the rule.
C. An incorrect application signature was used in the rule.
D. The rule was not enabled after being created.
Question 26
A network administrator wants to block traffic to a known malware site at [Link] and all subdomains
while ensuring no packets from any internal client are sent to that site. Which type of policy must the network
administrator use to accomplish this goal?
A. SSL policy
B. DNS policy
C. Prefilter policy
D. Access Control policy with URL filtering
Question 27
An engineer is attempting to add a new FTD device to their FMC behind a NAT device with a NAT ID of ACME001 and a
password of Cisco388267669. Which command set must be used in order to accomplish this?
[Link] 8/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Question 28
An engineer wants to perform a packet capture on the Cisco FTD to confirm that the host using IP address
[Link] has the MAC address of 0042.8935.603 to help troubleshoot a connectivity issue. What is the
correct tcpdump command syntax to ensure that the MAC address appears in the packet capture output?
An engineer is modifying an access control policy to add a rule to inspect all DNS traffic that passes through the
firewall. After making the change and deploying the policy, they see that DNS traffic is not being inspected by the
Snort engine. What is the problem?
A. The rule is configured with the wrong setting for the source port.
B. The rule must specify the security zone that originates the traffic.
C. The rule must define the source network for inspection as well as the port.
D. The action of the rule is set to trust instead of allow.
Question 30 An administrator needs to configure Cisco FMC to send a notification email when a data transfer larger
than 10 MB is initiated from an internal host outside of standard business hours. Which Cisco FMC feature must be
configured to accomplish this task?
A. correlation policy
B. intrusion policy
C. file and malware policy
D. application detector
[Link] 9/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Question 31 An organization is implementing Cisco FTD using transparent mode in the network. Which rule in the
default Access Control Policy ensures that this deployment does not create a loop in the network?
Question 32 The security engineer reviews the syslog server events of an organization and sees many outbound
connections to malicious sites initiated from hosts running Cisco Secure Endpoint. The hosts are on a separate network
from the Cisco FTD device. Which action blocks the connections?
A. Add the IP addresses of the malicious sites to the access control policy on the Cisco FMC
B. Add a Cisco Secure Endpoint policy with the Tetra and Spero engines enabled
C. Modify the access control policy on the Cisco FMC to block malicious outbound connections
D. Modify the policy on Cisco Secure Endpoint to enable DFC
Question 33
A security engineer is adding three Cisco FTD devices to a Cisco FMC. Two of the devices have successfully registered
to the Cisco FMC. The device that is unable to register is located behind a router that translates all outbound traffic to
the router’s WAN IP address. Which two steps are required for this device to register to the Cisco FMC? (Choose two)
A. Remove the IP address defined for the device in the Cisco FMC.
B. Configure a NAT ID on both the Cisco FMC and the device.
C. Add the port number being used for PAT on the router to the device’s IP address in the Cisco FMC.
D. Reconfigure the Cisco FMC to use the device’s hostname instead of IP address.
E. Reconfigure the Cisco FMC lo use the device’s private IP address instead of the WAN address.
Question 34
An engineer must deploy a Cisco FTD device. Management wants to examine traffic without requiring network changes
that will disrupt end users. Corporate security policy requires the separation of management traffic from data traffic
and the use of SSH over Telnet for remote administration. How must the device be deployed to meet these
requirements?
Question 35
An engineer has been tasked with performing an audit of network objects to determine which objects are duplicated
across the various firewall models (Cisco Secure Firewall Threat Defense, Cisco Secure Firewall ASA, and Meraki MX
Series) deployed throughout the company. Which tool will assist the engineer in performing that audit?
Question 36
[Link] 10/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
A network engineer is planning on replacing an Active/Standby pair of physical Cisco Secure Firewall ASAs with a pair
of Cisco Secure Firewall Threat Defense Virtual appliances. Which two virtual environments support the current High
Availability configuration? (Choose two)
A. Azure
B. KVM
C. AWS
D. ESXi
E. Openstack
Question 37
Which two considerations must be made when deleting and re-adding devices while managing them via Cisco FMC
(Choose two)
A. There is no option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the
policies after registration is completed.
B. Before re-adding the device In Cisco FMC, the manager must be added back.
C. An option to re-apply NAT and VPN policies during registration is available, so users do not need to re-apply the
polices after registration is completed.
D. The Cisco FMC web interface prompts users to re-apply access control policies.
E. Once a device has been deleted, It must be reconfigured before it is re-added to the Cisco FMC.
Question 38 A company is deploying a Cisco Secure IPS device configured in inline mode with a single interface set
that contains four interface pairs. Which two configurations must be implemented to allow the IPS device to uniquely
identify packet flows and prevent the reporting of duplicate traffic and false positives? (Choose two)
Question 39
Network users are experiencing intermittent issues with internet access. An engineer identified that the issue is being
caused by NAT exhaustion. How must the engineer change the dynamic NAT configuration to provide internet access
for more users without running out of resources?
Question 40
When a Cisco FTD device is configured in transparent firewall mode, on which two interface types can an IP address be
configured? (Choose two)
A. Subinterface
B. BVI
C. Physical
D. EtherChannel
[Link] 11/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
E. Diagnostic
Question 41
An administrator configures new threat intelligence sources and must validate that the feeds are being downloaded and
that the intelligence is being used within the Cisco Secure Firewall system. Which action accomplishes the task?
Question 42
With Cisco FTD software, which interface mode must be configured to passively receive traffic that passes through the
appliance?
A. tap
B. ERSPAN
C. firewall
D. IPS-only
Question 43
A network administrator must create an EtherChannel interface on a Cisco Secure Firewall Threat Defense 9300
appliance registered with Cisco Secure Firewall Management Center for High Availability. Where must the administrator
create the EtherChannel interface?
Question 44 What is the role of realms in the Cisco ISE and Cisco FMC integration?
Question 45
An administrator is configuring a transparent Cisco FTD device to receive ERSPAN traffic from multiple switches on a
passive port, but the FTD is not processing the traffic. What is the problem?
A. The switches were not set up with a monitor session ID that matches the flow ID defined on the FTD.
B. The FTD must be configured with an ERSPAN port, not a passive port.
C. The FTD must be in routed mode to process ERSPAN traffic.
D. The switches do not have Layer 3 connectivity to the FTD device for GRE traffic transmission.
Question 46
[Link] 12/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Which two statements are valid regarding the licensing model used on Cisco Secure Firewall Threat Defense Virtual
appliances? (Choose two)
Question 47
Which two features can be used with Cisco Secure Firewall Threat Defense remote access VPN? (Choose two)
Question 48
A consultant is working on a project where the customer is upgrading from a single Cisco Firepower 2130 managed by
FDM to a pair of Cisco Firepower 2130s managed by FMC for high availability. The customer wants the configuration of
the existing device being managed by FDM to be carried over to FMC and then replicated to the additional device being
added to create the high availability pair. Which action must the consultant take to meet this requirement?
A. The current FDM configuration will be converted automatically into FMC when the device registers.
B. The FTD configuration must be converted to ASA command format, which can then be migrated to FMC.
C. The current FDM configuration must be migrated to FMC using the Secure Firewall Migration Tool.
D. The current FDM configuration must be configured by hand into FMC before the devices are registered.
Question 49
An engineer is configuring URL filtering for a Cisco FTD device in Cisco FMC. Users must receive a warning when they
access [Link] with the option of continuing to the website if they choose to. No other websites
should be blacked. Which two actions must the engineer lake to meet these requirements? (Choose two)
A. Configure the default action for the access control policy to Interactive Block.
B. Configure an access control rule that matches an URL object for [Link] and set the action
Interactive Block.
C. On the HTTP Responses tab of the access control policy editor, set the Interactive Block Response Page to system
provided.
D. Configure an access control rule that matches the Adult URL category and set the action to Interactive Block.
E. On the HTTP Responses tab of the access control policy editor, set the Block Response Page to Custom.
Question 50 An engineer is setting up a remote access VPN on a Cisco FTD device and wants to define which traffic
gets sent over the VPN tunnel. Which named object type in Cisco FMC must be used to accomplish this task?
A. split tunnel
B. access list
C. crypto map
D. route map
[Link] 13/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Question 51
A network administrator is configuring a site-to-site IPsec VPN to a router sitting behind a Cisco FTD. The administrator
has configured an access policy to allow traffic to this device on UDP 500, 4500, and ESP VPN traffic is not working.
Which action resolves this issue?
Question 52 An administrator is adding a QoS policy to a Cisco FTD deployment. When a new rule is added to the
policy and QoS is applied on “Interfaces in Destination Interface Objects”, no interface objects are available. What is
the problem?
A. The network segments that the interfaces are on do not have contiguous IP space.
B. QoS is available only on routed interfaces, and this device is in transparent mode.
C. The FTD is out of available resources for use, so QoS cannot be added.
D. A conflict exists between the destination interface types that is preventing QoS from being added.
Question 53
An engineer must configure a Cisco FMC dashboard in a multidomain deployment. Which action must the engineer take
to edit a report template from an ancestor domain?
Question 54
A network administrator is troubleshooting access to a website hosted behind a Cisco FTD device. External clients
cannot access the web server via HTTPS. The IP address configured on the web server is [Link]. The
administrator is running the command capture CAP interface outside match ip any [Link]
[Link] but cannot see any traffic in the capture. Why is this occurring?
Question 55 Drag and drop the steps to restore an automatic device registration failure on the standby Cisco FMC
from the left into the correct order on the right. Not all options are used.
[Link] 14/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Note: Please type the corresponding numbers of each item on the left to the blank below so that they match the
corresponding textboxes on the right from top to bottom. For example: 3216 (which means 3 for 'Step 1', 2 for 'Step
2', 1 for 'Step 3' and 6 for 'Step 4'). Please type your answer here:
Question 56
An engineer is configuring a new dashboard within Cisco Secure Firewall Management Center and is having trouble
implementing a custom widget. When a custom analysis widget is configured, which option is mandatory for the
system to display the information?
A. title
B. table
C. filter
D. results
Question 57
An organization created a custom application that is being flagged by Cisco Secure Endpoint. The application must be
exempt from being flagged. What is the process to meet the requirement?
Question 58
A network administrator is reviewing a weekly scheduled attacks risk report and notices a host that is flagged for an
Impact 2 attack. Where should the administrator look within Cisco FMC to find out more relevant information about this
host and attack?
[Link] 15/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Question 59 While configuring FTD, a network engineer wants to ensure that traffic passing though the appliance
does not require routing or VLAN rewriting. Which interface mode should the engineer implement to accomplish this
task?
A. transparent
B. passive
C. inline set
D. inline tap
Question 60
An engineer plans to reconfigure an existing Cisco FTD from transparent mode to routed mode. Which additional action
must be taken to maintain communication between the two network segments?
Question 61 Encrypted Visibility Engine (EVE) is enabled under which tab on an access control policy in Cisco Secure
Firewall Management Center?
Question 62
An engineer is creating an URL object on Cisco FMC. How must it be configured so that the object will match for HTTPS
traffic in an access control policy?
Question 63 An organization is configuring a new Cisco Firepower High Availability deployment. Which action must be
taken to ensure that failover is as seamless as possible to end users?
Question 64
A network engineer is deploying a pair of Cisco Secure Firewall Threat Defense devices managed by Cisco Secure
Firewall Management Center for High Availability. Internet access is a high priority for the business and therefore they
have invested in internet circuits from two different ISPs. The requirement from the customer is that internet access
must be available to their users even if one of the ISPs is down. Which two features must be deployed to achieve this
requirement? (Choose two)
[Link] 16/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
A. Redundant interfaces
B. BGP
C. SLA Monitor
D. Route Tracking
E. Etherchannel interfaces
Question 65
A software development company hosts the website [Link] for contractors to share code for
projects they are working on with internal developers. The web server is on premises and is protected by a Cisco
Secure Firewall Threat Defense appliance. The network administrator is worried about someone trying to transmit
infected files to internal users via this site. Which type of policy must be associated with an access control policy to
enable Cisco Secure Firewall Malware Defense to detect and block malware?
A. prefilter policy
B. network discovery policy
C. SSL policy
D. file policy
Question 66
When an engineer captures traffic on a Cisco Secure Firewall Threat Defense device to troubleshoot a connectivity
problem, they receive a large amount of output data in the GUI tool. The engineer found that viewing the captures this
way is time-consuming and difficult to sort and filter. Which file type must the engineer export the data in so that it can
be reviewed using a tool built for this type of analysis?
A. NetFlow v5
B. IPFIX
C. PCAP
D. NetFlow v9
Question 67
What must be implemented on Cisco Firepower to allow multiple logical devices on a single physical device to have
access to external hosts?
Question 68
A network administrator is configuring a BVI interface on a routed FTD. The administrator wants to isolate traffic on the
interfaces connected to the bridge group and not have the FTD route this traffic using the routing table. What must be
configured?
A. IP routing must be removed from the physical interfaces connected to the BVI
B. A new VRF must be created for the BVI interface
C. An IP address must be configured on the BVI
D. The BVI interface must be configured for transparent mode
Question 69
[Link] 17/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
A company is deploying Cisco Secure Firewall Threat Defense with IPS. What must be implemented in inline mode to
pass the traffic without inspection during spikes and ensure that network traffic is kept?
Question 70
A network administrator reviews the attack risk report and notices several Low-Impact attacks. What does this type of
attack indicate?
Question 71
[Link] 18/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
An engineer is analyzing a Network Risk Report from Cisco FMC. Which application must the engineer take immediate
action against to prevent unauthorized network use?
A. TOR
[Link] 19/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
B. Kerberos
C. YouTube
D. Chrome
Question 72
A company is deploying intrusion protection on multiple Cisco FTD appliances managed by Cisco FMC. Which system-
provided policy must be selected if speed and detection are priorities?
Question 73
A security engineer must configure policies for a recently deployed Cisco FTD. The security policy for the company
dictates that when five or more connections from external sources are initiated within 2 minutes, there is cause for
concern. Which type of policy must be configured in Cisco FMC to generate an alert when this condition is triggered?
A. correlation
B. access control
C. intrusion
D. application detector
Question 74 A company is deploying Cisco Secure Endpoint private cloud. The Secure Endpoint private cloud instance
has already been deployed by the server administrator. The server administrator provided the hostname of the private
cloud instance to the network engineer via email. What additional information does the network engineer require from
the server administrator to be able to make the connection to Secure Endpoint private cloud in Cisco Secure Firewall
Management Centre?
Question 75 Drag and drop the configuration steps from the left into the sequence on the right to enable external
authentication on Cisco FMC to a RADIUS server.
Note: You just need to click on one of the boxes on the right to match it with the corresponding box on the left.
Step 1
Step 1
[Link] 20/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Step 1
Step 1
Question 76
An administrator is configuring the interface of a Cisco Secure Firewall Threat Defense firewall device in a passive IPS
deployment. The device and interface have been identified. Which set of configuration steps must the administrator
perform next to complete the implementation?
A. Modify the interface to retransmit received traffic. Associate the interface with a security zone. Set the MTU
parameter
B. Modify the interface to retransmit received traffic. Associate the interface with a security zone. Enable the interfa
Set the MTU parameter
C. Set the interface mode to passive. Associate the interface with a security zone. Enable the interface. Set the MTU
parameter
D. Set the interface mode to passive. Associate the interface with a security zone. Set the MTU parameter. Reset the
interface
Question 77
An engineer is troubleshooting HTTP traffic to a web server using the packet capture tool on Cisco FMC. When
reviewing the captures, the engineer notices that there are a lot of packets that are not sourced from or destined to
the web server being captured. How can the engineer reduce the strain of capturing packets for irrelevant traffic on the
Cisco FTD device?
A. Use the host filter in the packet capture to capture traffic to or from a specific host.
B. Use the -c option to restrict the packet capture to only the first 100 packets.
C. Use an access-list within the packet capture to permit only HTTP traffic to and from the web server.
D. Redirect the packet capture output to a .pcap file that can be opened with Wireshark.
Question 78
An external vendor is reporting that they are unable to access an ordering website hosted behind a Cisco Secure
Firewall Threat Defense device. The administrator of the device wants to verify that the access policy and NAT policy
are configured correctly to allow traffic from the public IP of the external vendor to TCP port 443 on the web server.
Which two Cisco Secure Firewall Management Center tools must the administrator use to verify which rules the traffic
from the external vendor is matching? (Choose two)
A. Packet Capture
B. Packet Tracer
C. Generate Troubleshooting File
D. File Download
E. Threat Defense CLI
Question 79
[Link] 21/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
A network administrator notices that SI events are not being updated. The Cisco FTD device is unable to load all of the
SI event entries and traffic is not being blocked as expected. What must be done to correct this issue?
A. Replace the affected devices with devices that provide more memory.
B. Manually update the SI event entries to that the appropriate traffic is blocked.
C. Restart the affected devices in order to reset the configurations.
D. Redeploy configurations to affected devices so that additional memory is allocated to the SI module
Question 80
A security engineer must integrate an external feed containing STIX/TAXII data with Cisco FMC. Which feature must be
enabled on the Cisco FMC to support this connection?
Question 81 A network administrator must create an EtherChannel interface on a new Cisco Firepower 9300 appliance
registered with an FMC for high availability. Where must the administrator create the EtherChannel interface?
A. FXOS CLI
B. FMC GUI
C. FTD CLI
D. FMC CLI
Question 82
A security engineer is deploying Cisco Secure Endpoint to detect a zero day malware attack with an SHA-256 hash
of 47ea931f3e8dc25ec0b0885a80663e30ea013d493f8e88224b570a0464084628. What must be configured in Cisco
Secure Endpoint to enable the application to take action based on this hash?
A. transform set
B. correlation policy
C. access control rule
D. custom detection list
Question 83 What is a limitation to consider when running a dynamic routing protocol on a Cisco FTD device in IRB
mode?
Question 84
An engineer must deploy a Cisco FTD appliance via Cisco FMC to span a network segment to detect malware and
threats. When setting the Cisco FTD interface mode, which sequence of actions meets this requirement?
A. Set to passive, and configure an access control policy with an intrusion policy and a file policy defined.
B. Set to passive, and configure an access control policy with a prefilter policy defined.
[Link] 22/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
C. Set to none, and configure an access control policy with a prefilter policy defined.
D. Set to none, and configure an access control policy with an intrusion policy and a file policy defined.
Question 85
A. Rewrite
B. Alert
C. Pass
D. Generate
Question 86
An engineer needs to configure remote storage on Cisco FMC. Configuration backups must be available from a secure
location on the network for disaster recovery. Reports need to back up to a shared location that auditors can access
with their Active Directory logins. Which strategy must the engineer use to meet these objectives?
Question 87
A network administrator is reviewing a monthly advanced malware risk report and notices a host that is listed as CnC
Connected. Where must the administrator look within Cisco FMC to further determine if this host is infected with
malware?
Question 88 Network traffic coming from an organization’s CEO must never be denied. Which access control policy
configuration option should be used if the deployment engineer is not permitted to create a rule to allow all traffic?
Question 89
Which process should be checked when troubleshooting registration issues between Cisco FMC and managed devices to
verify that secure communication is occurring?
A. fpcollect
B. sfmgr
C. dhclient
D. sftunnel
[Link] 23/24
2/2/25, 1:14 PM SNCF Training » SNCF All Questions of Part 3
Question 90
An engineer is configuring a Cisco Secure Firewall Threat Defense device and wants to create a new intrusion rule
based on the detection of a specific pattern in the data payload for a new zero-day exploit. Which keyword type must
be used to add a line that identifies the author of the rule and the date it was created?
A. reference
B. metadata
C. gtp_info
D. content
Question 91
Which default action setting in a Cisco FTD Access Control Policy allows all traffic from an undefined application to pass
without Snort inspection?
Question 92 An engineer is configuring a Cisco FTD device to place on the Finance VLAN to provide additional
protection for company financial data. The device must be deployed without requiring any changes on the end user
workstations, which currently use DHCP to obtain an IP address. How must the engineer deploy the device to meet this
requirement?
A. Deploy the device in transparent mode and enable the DHCP Server feature.
B. Deploy the device in routed mode and allow DHCP traffic in the access control policies.
C. Deploy the device in transparent mode and allow DHCP traffic in the access control policies.
D. Deploy the device in routed mode and enable the DHCP Relay feature.
[Link] 24/24