Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Questions 4

An email administrator must configure DLP policies on the Cisco Secure Email Gateway. The DLP policies must be added to the default outgoing mail policy. How is this task accomplished?

Options:

A.

Create a recipient group for the DLP policies and apply it to the default outgoing mail policy.

B.

Remove DLP policies with the same severity level prior to leveraging the DLP Assessment Wizard

C.

Create a classifier to match specific content within a predefined DLP policy template

D.

Remove all existing DLP policies prior to leveraging the DLP Assessment Wizard.

Buy Now
Questions 5

An engineer must enable SIDF for a mail flow policy on an incoming listener in Cisco Secure Email Gateway. Drag and drop the actions from the left into the sequence on the right to meet the requirement.

300-720 Question 5

Options:

Buy Now
Questions 6

Refer to the exhibit.

300-720 Question 6

What results from this filter configuration?

Options:

A.

Action is skipping all antivirus checks for the mail

B.

Action is applied to all mail that has the subject " FW: Bounce Notification. "

C.

Action is applied to all mail from test@cisco.com.

D.

Action is skipping all antispam checks for the mail.

Buy Now
Questions 7

Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?

Options:

A.

Basic Authentication

B.

No Authentication

C.

Microsoft 365 Authentication

D.

Cisco Security Cloud Sign On

Buy Now
Questions 8

300-720 Question 8

Refer to the exhibit. A security engineer must create a message filter on a Cisco Secure Email Gateway to scan all incoming emails for encrypted PDF files. Which code snippet completes the message filter?

Options:

A.

attachment

B.

attachment-binary-include

C.

attachment-binary-contains

D.

attachment-binary-file

Buy Now
Questions 9

An organization wants to designate help desk personnel to assist with tickets that request the release of messages from the spam quarantine because company policy does not permit direct end-user access to the quarantine. Which two roles must be used to allow help desk personnel to release messages while restricting their access to make configuration changes in the Cisco Secure Email Gateway? (Choose two.)

Options:

A.

Administrator

B.

Help Desk User

C.

Read-Only Operator

D.

Technician

E.

Quarantine Administrator

Buy Now
Questions 10

How does the graymail safe unsubscribe feature function?

Options:

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Buy Now
Questions 11

The CEO added a sender to a safelist but does not receive an important message expected from the trusted sender. An engineer evaluates message tracking on the Cisco Secure Email Gateway appliance and determines that the message was dropped by the antivirus engine. What is the reason for this behavior?

Options:

A.

The sender is included in an ISP blocklist

B.

Administrative access is required to create a safelist.

C.

The sender didn ' t mark the message as urgent

D.

End-user safelists apply to antispam engines only.

Buy Now
Questions 12

What are the two different phases in the process of Cisco Secure Email Gateway performing S/MIME encryption? (Choose two.)

Options:

A.

Attach the encrypted public key to the message

B.

Encrypt the message body using the session key

C.

Send the encrypted message to the sender

D.

Attach the encrypted symmetric key to the message

E.

Create a pseudo-random session key.

Buy Now
Questions 13

Which action must be taken before a custom quarantine that is being used can be deleted?

Options:

A.

Delete the quarantine that is assigned to a filter.

B.

Delete the quarantine that is not assigned to a filter.

C.

Delete only the unused quarantine.

D.

Remove the quarantine from the message action of a filter.

Buy Now
Questions 14

What validates users via LDAP during login to end-user quarantine?

Options:

A.

end-user authentication query

B.

alias consolidation query

C.

LDAP authentication query

D.

external authentication query

Buy Now
Questions 15

An engineer is configuring a Cisco Secure Email Gateway and needs to reject email messages to a recipient with email address user0516585210@acme.com . Which list contains the allowed recipient addresses?

Options:

A.

BAT

B.

HAT

C.

SAT

D.

RAT

Buy Now
Questions 16

300-720 Question 16

Refer to the exhibit. A security engineer must configure a Cisco Secure Email Gateway to ensure that encryption is enabled and the configured profile is provisioned. Which command must be used?

Options:

A.

setup

B.

check encryption

C.

provision

D.

profiles

Buy Now
Questions 17

An organization wants to use its existing Cisco ESA to host a new domain and enforce a separate corporate policy for that domain.

What should be done on the Cisco ESA to achieve this?

Options:

A.

Use the smtproutes command to configure a SMTP route for the new domain.

B.

Use the deli very config command to configure mail delivery for the new domain.

C.

Use the dsestconf command to add a separate destination for the new domain.

D.

Use the altrchost command to add a separate gateway for the new domain.

Buy Now
Questions 18

An engineer must provide differentiated email filtering to executives within the organization Which two actions must be taken to accomplish this task? (Choose two)

Options:

A.

Define an LDAP group query to specify users to whom the mail policy rules apply.

B.

Create content filters for actions to take on messages that contain specific data

C.

Upload a csv file containing the email addresses for the users for whom you want to create mail policies.

D.

Enable the content-scanning features you want to use with mail policies

E.

Define the default mail policies for incoming or outgoing messages

Buy Now
Questions 19

A security engineer wants to ensure that legitimate emails from info@partners.com are not quarantined as spam in Cisco Secure Email. Which action must be taken to meet this requirement?

Options:

A.

Remove the domain from the Wocklist.

B.

Add the domain to the allowlist.

C.

Add the domain to the safelist.

D.

Add all partners.com email addresses to the allowlist.

Buy Now
Questions 20

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

Options:

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Buy Now
Questions 21

What are two phases of the Cisco ESA email pipeline? (Choose two.)

Options:

A.

reject

B.

workqueue

C.

action

D.

delivery

E.

quarantine

Buy Now
Questions 22

300-720 Question 22

300-720 Question 22

Refer to the exhibits. What must be done to enforce end user authentication before accessing quarantine?

Options:

A.

Enable SPAM notification and use LDAP for authentication.

B.

Enable SPAM Quarantine Notification and add the %quarantine_url% variable.

C.

Change the end user quarantine access from Non e authentication to SAAS.

D.

Change the end user quarantine access setting from None authentication to Mailbox.

Buy Now
Questions 23

Which of the following two statements are correct about the large file attachments (greater than 25MB) feature in Cisco Secure Email Encryption Service? (Choose two.)

Options:

A.

Large file attachments can only be sent using the websafe portal

B.

This feature allows users to send up to 50MB of attachments in a secure email.

C.

Large file attachments will be sent as a securedoc attachment

D.

Large file attachments can only be sent using the Cisco Secure Email Add-In.

E.

This feature can only be enabled if the Read from Message feature is enabled

Buy Now
Questions 24

An engineer must configure a policy quarantine in Cisco Secure Email Gateway. The retention time must be 7 days and user@cisco.com must have access to the quarantine. Drag and drop the actions from the left into the sequence on the right to meet the requirements.

300-720 Question 24

Options:

Buy Now
Questions 25

An engineer must configure the message source when integrating Cisco Secure Email Threat Defense with Microsoft 365. The integration must allow visibility but not remediation. Drag and drop the actions from the left into sequence on the right to meet the requirement.

300-720 Question 25

Options:

Buy Now
Questions 26

An administrator is trying to enable centralized PVO but receives the error, " Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters / DLP actions available at a level different from the cluster level. "

What is the cause of this error?

Options:

A.

Content filters are configured at the machine-level on esa1.

B.

DLP is configured at the cluster-level on esa2.

C.

DLP is configured at the domain-level on esa1.

D.

DLP is not configured on host1.

Buy Now
Questions 27

An engineer must configure a virtual gateway on a Cisco Secure Email Gateway to send email for a group named Grouplnt. Grouplnt is part of these domains:

•domain 1 -lab

•domain2.lab

Drag and drop the code snippets from the right onto the boxes to configure the virtual gateway. Not all options are used.

300-720 Question 27

Options:

Buy Now
Questions 28

Which type of attack does Bounce Verification fight against?

Options:

A.

identity

B.

backscatter

C.

phishing

D.

spear phishing

Buy Now
Questions 29

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Buy Now
Questions 30

An engineer must modify the altsrchost table on a Cisco Secure Email Gateway Messages destined for a domain named @cisco.com must be mapped to Newlnterface with an IP address of 10.10.10.1. What must be added to the table?

Options:

A.

Newlnterface @cisco.com

B.

Cisco com® 10.10.10.1

C.

@cisco.com Newlnterface

D.

cisco.com® Newlnterface

Buy Now
Questions 31

Which component must be added to the content filter to trigger on failed SPF Verification or DKIM Authentication verdicts?

Options:

A.

status

B.

response

C.

parameter

D.

condition

Buy Now
Questions 32

Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)

Options:

A.

Paste in the Registration Token generated from the Smart Licensing Account

B.

Enable the Threat Response service under Network > Cloud Service Settings.

C.

Select the correct Threat Response Server based on your region.

D.

Paste in the Registration Token generated from the Security Services Exchange.

E.

Enable the Security Services Exchange service under Network > Cloud Service Settings

Buy Now
Questions 33

An engineer must configure incoming message verification using DM ARC in Cisco Secure Email Gateway. Emails from VP@cisco.com must skip the verification Drag and drop the actions from the left into the sequence on the right to meet the requirement.

300-720 Question 33

Options:

Buy Now
Questions 34

An engineer must configure a local spam quarantine in Cisco Secure Email Gateway These configurations were already performed: •Enable the Anti-Spam feature and configure the quarantine settings •Specify the disk space to allocate to the spam quarantine.

Which two actions must be taken to complete the configuration? (Choose two.)

Options:

A.

Configure a mail policy.

B.

Enable Outbreak Filters.

C.

Set the quarantine threshold to 3

D.

Allow browser access

E.

Activate Outgoing Content Filters.

Buy Now
Questions 35

Which two are configured in the DMARC verification profile? (Choose two.)

Options:

A.

name of the verification profile

B.

minimum number of signatures to verify

C.

ESA listeners to use the verification profile

D.

message action into an incoming or outgoing content filter

E.

message action to take when the policy is reject/quarantine

Buy Now
Questions 36

Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?

Options:

A.

quarantine threat level

B.

antispam

C.

data loss prevention

D.

antivirus

Buy Now
Questions 37

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

Options:

A.

DHAP

B.

SBRS

C.

LDAP

D.

SMTP

Buy Now
Questions 38

What occurs when configuring separate incoming mail policies?

Options:

A.

message splintering

B.

message exceptions

C.

message detachment

D.

message aggregation

Buy Now
Questions 39

When virtual gateways are configured, which two distinct attributes are allocated to each virtual gateway address? (Choose two.)

Options:

A.

domain

B.

IP address

C.

DNS server address

D.

DHCP server address

E.

external spam quarantine

Buy Now
Questions 40

300-720 Question 40

Refer to the exhibit. What is the correct order of c ommands to set filter 2 to active?

Options:

A.

filters- > edit- > 2- > Active

B.

filters- > modify- > All- > Active

C.

filters- > detail- > 2- > 1

D.

filters- > set- > 2- > 1

Buy Now
Questions 41

An email containing a URL passes through the Cisco ESA that has content filtering disabled for all mail policies. The sender is sampleuser@test1.com, the recipients are testuser1@test2.com, testuser2@test2.com, testuser3@test2.com, and mailer1@te st2.com. The subject of the email is Test Document395898847. An administrator wants to add a policy to ensure that the Cisco ESA evaluates the web reputation score before permitting this email.

Which two criteria must be used by the administrator to achie ve this? (Choose two.)

Options:

A.

Subject contains Test Document "

B.

Sender matches test1.com

C.

Email body contains a URL

D.

Date and time of email

E.

Email does not match mailer1@test2.com

Buy Now
Questions 42

An engineer is tasked with reviewing mail logs to confirm that messages sent from domain abc.com are passing SPF verification and being accepted by the Cisco ESA. The engineer notices that SPF veri fication is not being performed and that SPF is not being referenced in the logs for messages sent from domain abc.com.

Why is the verification not working properly?

Options:

A.

SPF verification is disabled in the Recipient Access Table.

B.

SPF verification i s disabled on the Mail Flow Policy.

C.

The SPF conformance level is set to SIDF compatible on the Mail Flow Policy.

D.

An SPF verification Content Filter has not been created.

Buy Now
Questions 43

What is a category for classifying graymail?

Options:

A.

Malicious

B.

Marketing

C.

Spam

D.

Priority

Buy Now
Questions 44

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?

Options:

A.

Enable the DKIM service checker

B.

Export the DNS TXT record to provide to the DNS registrar

C.

Import the DNS record of the service provider into the Cisco Secure Email Gateway.

D.

Configure the Trusted Sender Group message authenticity policy.

Buy Now
Questions 45

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

Options:

A.

message-ID

B.

sender

C.

URL reputation

D.

from

E.

mail-from

Buy Now
Questions 46

Email encryption is configured on a Cisco ESA that uses CRES.

Which action is taken on a message when CRES is unavailable?

Options:

A.

It is requeued.

B.

It is sent in clear text.

C.

It is dropped and an error message is sent to the sender.

D.

It is encrypted by a Cisco encryption appliance.

Buy Now
Questions 47

A company ' s CFO is requesting the email administrator create an exception for graymail from a certain yoga studio ' s weekly newsletter. Which category of graymail does this fall under?

Options:

A.

Mass

B.

Marketing

C.

Social Network

D.

Sales

Buy Now
Questions 48

Which restriction is in place for end users accessing the spam quarantine on Cisco Secure Email Gateway appliances?

Options:

A.

Access via a link in a notification is mandatory.

B.

The end user must be assigned to the Guest role

C.

Direct access via web browser requires authentication.

D.

Authentication is required when accessing via a link in a notification.

Buy Now
Questions 49

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

Options:

A.

SenderBase Reputation Filtering

B.

Connection Reputation Filtering

C.

Talos Reputation Filtering

D.

SpamCop Reputation Filtering

Buy Now
Questions 50

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

Options:

A.

83

B.

82

C.

443

D.

80

Buy Now
Questions 51

An analyst creates a new content dictionary to use with Forged Email Detection.

Which entry will be added into the dictionary?

Options:

A.

mycompany.com

B.

Alpha Beta

C.

^Alpha\ Beta$

D.

Alpha.Beta@mycompany.com

Buy Now
Questions 52

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)

Options:

A.

DKIM

B.

Public Keys

C.

Domain Keys

D.

Symmetric Keys

E.

Private Keys

Buy Now
Questions 53

An engineer is testing mail flow on a new Cisco ESA and notices that messages for domain abc.com are stuck in the delivery queue. Upon further investigation, the engineer notices that the messages pending delivery are destined for 192.168.1.11, when they should instead be routed to 192.168.1.10.

What configuration change needed to address this issue?

Options:

A.

Add an address list for domain abc.com .

B.

Modify Destination Controls entry for the domain abc.com .

C.

Modify the SMTP route for the domain and change the IP a ddress to 192.168.1.10.

D.

Modify the Routing Tables and add a route for IP address to 192.168.1.10.

Buy Now
Questions 54

What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

Options:

A.

8025

B.

6443

C.

6025

D.

8443

Buy Now
Questions 55

An Encryption Profile has been set up on the Cisco ESA.

Drag and drop the steps from the left for creating an outgoing content filter to encrypt emails that contains the subject " Secure: " into the correct order on the right.

300-720 Question 55

Options:

Buy Now
Questions 56

An engineer must add the user1@cisco.co m with an IP address of 10.1.1.13 to a safelist in Cisco Secure Email Gateway. Which two safelist syntaxes must be configured to meet the requirement? (Choose two.)

Options:

A.

[10.1.1.16/30]

B.

user1@ [10.1.1.13]

C.

[10.1.1.0/24]

D.

[10.1.1.13/30]

Buy Now
Questions 57

When the spam quarantine is configured on the Cisco Secure Email Gateway, which type of query is used to validate non administrative user access to the end-user quarantine via LDAP?

Options:

A.

spam quarantine end-user authentication

B.

spam quarantine alias consolidation

C.

spam quarantine external authorization

D.

local mailbox (IMAP/POP) authentication

Buy Now
Exam Code: 300-720
Exam Name: Securing Email with Cisco Email Security Appliance (300-720 SESA)
Last Update: May 5, 2026
Questions: 190

PDF + Testing Engine

$65.27  $186.49

Testing Engine

$52.32  $149.49
buy now 300-720 testing engine

PDF (Q&A)

$48.12  $137.49
buy now 300-720 pdf