Labour Day Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Questions 4

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

Options:

A.

message-ID

B.

sender

C.

URL reputation

D.

from

E.

mail-from

Buy Now
Questions 5

What is the default behavior of any listener for TLS communication?

Options:

A.

preferred-verify

B.

off

C.

preferred

D.

required

Buy Now
Questions 6

An organization wants to designate help desk personnel to assist with tickets that request the release of messages from the spam quarantine because company policy does not permit direct end-user access to the quarantine. Which two roles must be used to allow help desk personnel to release messages while restricting their access to make configuration changes in the Cisco Secure Email Gateway? (Choose two.)

Options:

A.

Administrator

B.

Help Desk User

C.

Read-Only Operator

D.

Technician

E.

Quarantine Administrator

Buy Now
Questions 7

What is the order of virus scanning when multilayer antivirus scanning is configured?

Options:

A.

The default engine scans for viruses first and the McAfee engine scans for viruses second.

B.

The Sophos engine scans for viruses first and the McAfee engine scans for viruses second.

C.

The McAfee engine scans for viruses first and the default engine scans for viruses second.

D.

The McAfee engine scans for viruses first and the Sophos engine scans for viruses second.

Buy Now
Questions 8

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

Options:

A.

DHAP

B.

SBRS

C.

LDAP

D.

SMTP

Buy Now
Questions 9

A Cisco ESA administrator has noticed that new messages being sent to the Centralized Policy Quarantine are being released after one hour. Previously, they were being held for a day before being released.

What was configured that caused this to occur?

Options:

A.

The retention period was changed to one hour.

B.

The threshold settings were set to override the clock settings.

C.

The retention period was set to default.

D.

The threshold settings were set to default.

Buy Now
Questions 10

Refer to the exhibit.

300-720 Question 10

Which additional configuration action must be taken to protect against Directory Harvest Attacks?

Options:

A.

When LDAP Queries are configured, Directory Harvest Attack Prevention is enabled by default.

B.

In the LDAP Server profile, configure Directory Harvest Attack Prevention

C.

In the mail flow policy, configure Directory Harvest Attack Prevention.

D.

In the Listener Settings, modify the LDAP Queries configuration to use the Work Queue

Buy Now
Questions 11

What is the purpose of Cisco Email Encryption on Cisco ESA?

Options:

A.

to ensure anonymity between a recipient and MTA

B.

to ensure integrity between a sender and MTA

C.

to authenticate direct communication between a sender and Cisco ESA

D.

to ensure privacy between Cisco ESA and MTA

Buy Now
Questions 12

Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?

Options:

A.

DER certificate and matching public key from a CA

B.

self-signed certificate in PKCS#7 format

C.

X. 509 certificate and matching private key from a CA

D.

self-signed certificate in PKCS#12 format

Buy Now
Questions 13

Which setting affects the aggressiveness of spam detection?

Options:

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Buy Now
Questions 14

The company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data Users must be able to flag the messages that require encryption versus a Cisco Secure Email Gateway appliance scanning all messages and automatically encrypting via detection Which action enables this capability?

Options:

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

Buy Now
Questions 15

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

Options:

A.

message-ID

B.

sender

C.

URL reputation

D.

from

E.

mail-from

Buy Now
Questions 16

Which two are configured in the DMARC verification profile? (Choose two.)

Options:

A.

name of the verification profile

B.

minimum number of signatures to verify

C.

ESA listeners to use the verification profile

D.

message action into an incoming or outgoing content filter

E.

message action to take when the policy is reject/quarantine

Buy Now
Questions 17

Which attack is mitigated by using Bounce Verification?

Options:

A.

spoof

B.

denial of service

C.

eavesdropping

D.

smurf

Buy Now
Questions 18

Which two features are applied to either incoming or outgoing mail policies? (Choose two.)

Options:

A.

Indication of Compromise

B.

application filtering

C.

outbreak filters

D.

sender reputation filtering

E.

antivirus

Buy Now
Questions 19

What are two primary components of content filters? (Choose two.)

Options:

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Buy Now
Questions 20

Which type of attack is prevented by configuring file reputation filtering and file analysis features?

Options:

A.

denial of service

B.

zero-day

C.

backscatter

D.

phishing

Buy Now
Questions 21

Which action do Outbreak Filters take to stop small-scale and nonviral attacks, such as phishing scams and malware distribution sites?

Options:

A.

Rewrite URLs to redirect traffic to potentially harmful websites through a web security proxy

B.

Block all emails from email domains associated with potentially harmful websites.

C.

Strip all attachments from email domains associated with potentially harmful websites.

D.

Quarantine messages that contain links to potentially harmful websites until the site is taken offline

Buy Now
Questions 22

An administrator notices that incoming emails with certain attachments do not get delivered to all recipients when the emails have multiple recipients in different domains like cisco.com and test.com. The same emails when sent only to recipients in cisco.com are delivered properly. How must the Cisco Secure Email Gateway be configured to avoid this behavior?

Options:

A.

Modify mail policies for cisco.com to ensure that emails are not dropped.

B.

Modify mail policies so email recipients do not match multiple policies.

C.

Modify DLP configuration to ensure that all attachments are permitted for test.com.

D.

Modify DLP configuration to exempt DLP scanning for messages sent to test.com domain

Buy Now
Questions 23

A list of company executives is routinely being spoofed, which puts the company at risk of malicious email attacks An administrator must ensure that executive messages are originating from legitimate sending addresses Which two steps must be taken to accomplish this task? (Choose two.)

Options:

A.

Create an incoming content filter with SPF detection.

B.

Enable the Forged Email Detection feature under Security Settings.

C.

Enable DMARC feature under Mail Policies.

D.

Create an incoming content filter with the Forged Email Detection condition

E.

Create a content dictionary including a list of the names that are being spoofed.

Buy Now
Questions 24

An administrator notices that the Cisco Secure Email Gateway delivery queue on an appliance is consistently full. After further investigation, it is determined that the IP addresses currently in use by appliance are being rate-limited by some destinations. The administrator creates a new interface with an additional IP address using virtual gateway technology, but the issue is not solved Which configuration change resolves the issue?

Options:

A.

Use the CLI command altsrchost to set the new interface as the source IP address for all mail.

B.

Use the CLI command loadbalance auto to enable mail delivery over all interfaces.

C.

Use the CLI command alt-src-host to set the new interface as a possible delivery candidate.

D.

Use the CLI command deliveryconfig to set the new interface as the primary interface for mail delivery

Buy Now
Questions 25

A Cisco Secure Email Gateway administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?

Options:

A.

Accept

B.

Delay

C.

Relay

D.

Reject

Buy Now
Questions 26

What are two primary components of content filters? (Choose two.)

Options:

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Buy Now
Questions 27

Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?

Options:

A.

traffic between the Cisco Secure Email Gateway and the LDAP server

B.

emails being delivered from the Cisco Secure Email Gateway

C.

HTTPS traffic when connecting to the web user interface of the Cisco Secure Email Gateway

D.

emails being received by the Cisco Secure Email Gateway

Buy Now
Questions 28

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

Options:

A.

default

B.

system

C.

user

D.

custom

E.

demo

Buy Now
Questions 29

What is a valid content filter action?

Options:

A.

decrypt on delivery

B.

quarantine

C.

skip antispam

D.

archive

Buy Now
Questions 30

What are two primary components of content filters? (Choose two.)

Options:

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Buy Now
Questions 31

When URL logging is configured on a Cisco ESA, which feature must be enabled first?

Options:

A.

antivirus

B.

antispam

C.

virus outbreak filter

D.

senderbase reputation filter

Buy Now
Questions 32

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Buy Now
Questions 33

An email containing a URL passes through the Cisco ESA that has content filtering disabled for all mail policies. The sender is sampleuser@test1.com, the recipients are testuser1@test2.com, testuser2@test2.com, testuser3@test2.com, and mailer1@test2.com. The subject of the email is Test Document395898847. An administrator wants to add a policy to ensure that the Cisco ESA evaluates the web reputation score before permitting this email.

Which two criteria must be used by the administrator to achieve this? (Choose two.)

Options:

A.

Subject contains Test Document"

B.

Sender matches test1.com

C.

Email body contains a URL

D.

Date and time of email

E.

Email does not match mailer1@test2.com

Buy Now
Questions 34

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Buy Now
Questions 35

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

Options:

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Buy Now
Questions 36

Refer to the exhibit.

300-720 Question 36

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

Options:

A.

skip-filters

B.

log-entry

C.

spf-status

D.

quarantine

Buy Now
Questions 37

Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?

Options:

A.

DER certificate and matching public key from a CA

B.

self-signed certificate in PKCS#7 format

C.

X. 509 certificate and matching private key from a CA

D.

self-signed certificate in PKCS#12 format

Buy Now
Questions 38

Which two action types are performed by Cisco ESA message filters? (Choose two.)

Options:

A.

non-final actions

B.

filter actions

C.

discard actions

D.

final actions

E.

quarantine actions

Buy Now
Questions 39

Which setting affects the aggressiveness of spam detection?

Options:

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Buy Now
Questions 40

Which benefit does enabling external spam quarantine on Cisco SMA provide?

Options:

A.

ability to back up spam quarantine from multiple Cisco ESAs to one central console

B.

access to the spam quarantine interface on which a user can release, duplicate, or delete

C.

ability to scan messages by using two engines to increase a catch rate

D.

ability to consolidate spam quarantine data from multiple Cisco ESA to one central console

Buy Now
Questions 41

Email encryption is configured on a Cisco ESA that uses CRES.

Which action is taken on a message when CRES is unavailable?

Options:

A.

It is requeued.

B.

It is sent in clear text.

C.

It is dropped and an error message is sent to the sender.

D.

It is encrypted by a Cisco encryption appliance.

Buy Now
Questions 42

An administrator is trying to enable centralized PVO but receives the error, "Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters / DLP actions available at a level different from the cluster level."

What is the cause of this error?

Options:

A.

Content filters are configured at the machine-level on esa1.

B.

DLP is configured at the cluster-level on esa2.

C.

DLP is configured at the domain-level on esa1.

D.

DLP is not configured on host1.

Buy Now
Questions 43

An analyst creates a new content dictionary to use with Forged Email Detection.

Which entry will be added into the dictionary?

Options:

A.

mycompany.com

B.

Alpha Beta

C.

^Alpha\ Beta$

D.

Alpha.Beta@mycompany.com

Buy Now
Questions 44

An engineer must provide differentiated email filtering to executives within the organization Which two actions must be taken to accomplish this task? (Choose two)

Options:

A.

Define an LDAP group query to specify users to whom the mail policy rules apply.

B.

Create content filters for actions to take on messages that contain specific data

C.

Upload a csv file containing the email addresses for the users for whom you want to create mail policies.

D.

Enable the content-scanning features you want to use with mail policies

E.

Define the default mail policies for incoming or outgoing messages

Buy Now
Exam Code: 300-720
Exam Name: Securing Email with Cisco Email Security Appliance (300-720 SESA)
Last Update: Apr 30, 2024
Questions: 147

PDF + Testing Engine

$70  $174.99

Testing Engine

$54  $134.99
buy now 300-720 testing engine

PDF (Q&A)

$48  $119.99
buy now 300-720 pdf