Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-730 Topic 13 Question 92 Discussion

Actual exam question for Cisco's 300-730 exam
Question #: 92
Topic #: 13
[All 300-730 Questions]

A network administrator wants to block traffic to a known malware site at https:/www.badsite.com and all subdomains while ensuring no packets from any internal client are sent to that site. Which type of policy must the network administrator use to accomplish this goal?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

Kati
2 months ago
Prefilter policy, definitely. Gotta keep those pesky malware sites out of our network, no matter what!
upvoted 0 times
Nida
1 months ago
Yes, using prefilter policy is the best option to block traffic to known malware sites and prevent any internal client packets from reaching them.
upvoted 0 times
...
Xuan
1 months ago
Prefilter policy, definitely. Gotta keep those pesky malware sites out of our network, no matter what!
upvoted 0 times
...
...
France
2 months ago
Haha, I almost went with the SSL policy, thinking 'Hey, let's just decrypt the traffic!' But prefilter is the clear winner here.
upvoted 0 times
...
Ernie
2 months ago
Hmm, I was thinking DNS policy, but you're right, prefilter is the way to go. Good one, guys!
upvoted 0 times
Monte
1 months ago
Hmm, I was thinking DNS policy, but you're right, prefilter is the way to go. Good one, guys!
upvoted 0 times
...
Blondell
1 months ago
B) Prefilter policy is a type of policy that allows you to perform fast actions on traffic before it reaches the Access Control policy. You can use prefilter rules to drop, fastpath, or trust traffic based on simple criteria, such as IP addresses or ports. However, prefilter rules do not support URL filtering, so you cannot use them to block traffic based on the website domain.
upvoted 0 times
...
Micah
2 months ago
A) Access Control policy with URL filtering
upvoted 0 times
...
...
Mila
2 months ago
That's true, but Prefilter policy doesn't support URL filtering, so it may not be the most effective in this scenario.
upvoted 0 times
...
Kaycee
2 months ago
I agree, B is the correct answer. Prefilter policy is the best choice to accomplish the task at hand.
upvoted 0 times
Davida
1 months ago
I agree, B is the correct answer. Prefilter policy is the best choice to accomplish the task at hand.
upvoted 0 times
...
Bev
1 months ago
Prefilter policy allows you to take action on traffic before it reaches the Access Control policy.
upvoted 0 times
...
Deeann
2 months ago
User 2: Actually, the correct answer is B) Prefilter policy.
upvoted 0 times
...
Dawne
2 months ago
User 1: I think the answer is A) Access Control policy with URL filtering.
upvoted 0 times
...
...
Olen
3 months ago
Option B seems like the way to go. Prefilter policy can block the traffic to the malware site without any hassle.
upvoted 0 times
Clarinda
2 months ago
User 2: Definitely, prefilter policy allows for quick actions on traffic before it reaches the Access Control policy.
upvoted 0 times
...
Alease
2 months ago
User 1: I agree, using a prefilter policy would be the best option to block traffic to the malware site.
upvoted 0 times
...
...
Tonette
3 months ago
I'm not sure about that. Prefilter policy could also be useful to quickly drop traffic before it reaches the Access Control policy.
upvoted 0 times
...
Mariann
3 months ago
I agree with Mila. Access Control policy with URL filtering is the best option to prevent internal clients from accessing the bad site.
upvoted 0 times
...
Mila
3 months ago
I think the network administrator should use Access Control policy with URL filtering to block traffic to the malware site.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77