Cisco 300-710 Securing Networks with Cisco Firepower (SNCF) Online Training
Cisco 300-710 Online Training
The questions for 300-710 were last updated at Jan 12,2026.
- Exam Code: 300-710
- Exam Name: Securing Networks with Cisco Firepower (SNCF)
- Certification Provider: Cisco
- Latest update: Jan 12,2026
A network engineer is configuring URL Filtering on Firepower Threat Defense.
Which two port requirements on the Firepower Management Center must be validated to allow communication with the cloud service? (Choose two.)
- A . outbound port TCP/443
- B . inbound port TCP/80
- C . outbound port TCP/8080
- D . inbound port TCP/443
- E . outbound port TCP/80
What is the maximum bit size that Cisco FMC supports for HTTPS certificates?
- A . 1024
- B . 8192
- C . 4096
- D . 2048
Which limitation applies to Cisco Firepower Management Center dashboards in a multidomain environment?
- A . Child domains can view but not edit dashboards that originate from an ancestor domain.
- B . Child domains have access to only a limited set of widgets from ancestor domains.
- C . Only the administrator of the top ancestor domain can view dashboards.
- D . Child domains cannot view dashboards that originate from an ancestor domain.
Which two statements about deleting and re-adding a device to Cisco FMC are true? (Choose two.)
- A . An option to re-apply NAT and VPN policies during registration is available, so users do not need to re- apply the policies after registration is completed.
- B . Before re-adding the device in Cisco FMC, you must add the manager back in the device.
- C . No option to delete and re-add a device is available in the Cisco FMC web interface.
- D . The Cisco FMC web interface prompts users to re-apply access control policies.
- E . No option to re-apply NAT and VPN policies during registration is available, so users need to re-apply the policies after registration is completed.
What is a behavior of a Cisco FMC database purge?
- A . User login and history data are removed from the database if the User Activity check box is selected.
- B . Data can be recovered from the device.
- C . The appropriate process is restarted.
- D . The specified data is removed from Cisco FMC and kept for two weeks.
Which two packet captures does the FTD LINA engine support? (Choose two.)
- A . Layer 7 network ID
- B . source IP
- C . application ID
- D . dynamic firewall importing
- E . protocol
Which two features of Cisco AMP for Endpoints allow for an uploaded file to be blocked? (Choose two.)
- A . application blocking
- B . simple custom detection
- C . file repository
- D . exclusions
- E . application whitelisting
Which action should you take when Cisco Threat Response notifies you that AMP has identified a file as malware?
- A . Add the malicious file to the block list.
- B . Send a snapshot to Cisco for technical support.
- C . Forward the result of the investigation to an external threat-analysis engine.
- D . Wait for Cisco Threat Response to automatically block the malware.
Which Cisco Advanced Malware Protection for Endpoints policy is used only for monitoring endpoint actively?
- A . Windows domain controller
- B . audit
- C . triage
- D . protection
What is a valid Cisco AMP file disposition?
- A . non-malicious
- B . malware
- C . known-good
- D . pristine