Implementing Cisco Threat Control Solutions: 300-207 Exam
300-207 Questions & Answers
Exam Code: 300-207
Exam Name: Implementing Cisco Threat Control Solutions
Q & A: 99 Q&As
QUESTION 1
Which command establishes a virtual console session to a CX module within a Cisco Adaptive
Security Appliance?
A. session 1 ip address
B. session 2 ip address
C. session 1
D. session ips console
E. session cxsc console
Answer: E
QUESTION 2
What is the default CX Management 0/0 IP address on a Cisco ASA 5512-X appliance?
A. 192.168.1.1
B. 192.168.1.2
C. 192.168.1.3
D. 192.168.1.4
E. 192.168.1.5
F. 192.168.8.8
Answer: F
QUESTION 3
An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block
all traffic if the module fails. Which describes the correct configuration?
A. Inline Mode, Permit Traffic
B. Inline Mode, Close Traffic
C. Promiscuous Mode, Permit Traffic
D. Promiscuous Mode, Close Traffic
Answer: B
QUESTION 4
A new Cisco IPS device has been placed on the network without prior analysis. Which CLI
command shows the most fired signature?
A. Show statistics virtual-sensor
B. Show event alert
C. Show alert
D. Show version
Answer: A
QUESTION 5
What CLI command configures IP-based access to restrict GUI and CLI access to a Cisco Email
Security appliance’s administrative interface?
A. adminaccessconfig
B. sshconfig
C. sslconfig
D. ipaccessconfig
Answer: A
QUESTION 6
An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block
all traffic if the module fails. Which describes the correct configuration?
A. Inline Mode, Permit Traffic
B. Inline Mode, Close Traffic
C. Promiscuous Mode, Permit Traffic
D. Promiscuous Mode, Close Traffic
Answer: B
QUESTION 7
A new Cisco IPS device has been placed on the network without prior analysis. Which CLI
command shows the most fired signature?
A. Show statistics virtual-sensor
B. Show event alert
C. Show alert
D. Show version
Answer: A
QUESTION 8
Which three options are characteristics of router-based IPS? (Choose three.)
A. It is used for large networks.
B. It is used for small networks.
C. It supports virtual sensors.
D. It supports multiple VRFs.
E. It uses configurable anomaly detection.
F. Signature definition files have been deprecated.
Answer: BDF
QUESTION 9
What are three best practices for a Cisco Intrusion Prevention System? (Choose three.)
A. Checking for new signatures every 4 hours
B. Checking for new signatures on a staggered schedule
C. Automatically updating signature packs D. Manually updating signature packs
E. Group tuning of signatures
F. Single tuning of signatures
Answer: BCE
QUESTION 10
Who or what calculates the signature fidelity rating?
A. the signature author
B. Cisco Professional Services
C. the administrator
D. the security policy
Answer: A
QUESTION 11
Which three zones are used for anomaly detection? (Choose three.)
A. Internal zone
B. External zone
C. Illegal zone
D. Inside zone
E. Outside zone
F. DMZ zone
Answer: ABC
QUESTION 12
What is the default IP range of the external zone?
A. 0.0.0.0 0.0.0.0
B. 0.0.0.0 – 255.255.255.255
C. 0.0.0.0/8
D. The network of the management interface
Answer: B
QUESTION 13
When learning accept mode is set to auto, and the action is set to rotate, when is the KB created
and used?
A. It is created every 24 hours and used for 24 hours.
B. It is created every 24 hours, but the current KB is used.
C. It is created every 1 hour and used for 24 hours.
D. A KB is created only in manual mode.
Answer: A
…go to http://www.lead2pass.com/300-207.html to download the full version Q&As.