Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cisco 300-720 Dumps

Page: 1 / 11
Total 147 questions

Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Question 1

An administrator needs to configure Cisco ESA to ensure that emails are sent and authorized by the owner of the domain. Which two steps must be performed to accomplish this task? (Choose two.)

Options:

A.

Generate keys.

B.

Create signing profile.

C.

Create Mx record.

D.

Enable SPF verification.

E.

Create DMARC profile.

Question 2

Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?

Options:

A.

traffic between the Cisco Secure Email Gateway and the LDAP server

B.

emails being delivered from the Cisco Secure Email Gateway

C.

HTTPS traffic when connecting to the web user interface of the Cisco Secure Email Gateway

D.

emails being received by the Cisco Secure Email Gateway

Question 3

Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)

Options:

A.

Paste in the Registration Token generated from the Smart Licensing Account

B.

Enable the Threat Response service under Network>Cloud Service Settings.

C.

Select the correct Threat Response Server based on your region.

D.

Paste in the Registration Token generated from the Security Services Exchange.

E.

Enable the Security Services Exchange service under Network>Cloud Service Settings

Question 4

Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)

Options:

A.

accept

B.

relay

C.

delay

D.

route

E.

reject

Question 5

Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?

Options:

A.

DER certificate and matching public key from a CA

B.

self-signed certificate in PKCS#7 format

C.

X. 509 certificate and matching private key from a CA

D.

self-signed certificate in PKCS#12 format

Question 6

An engineer wants to utilize a digital signature in outgoing emails to validate to others that the email they are receiving was indeed sent and authorized by the owner of that domain Which two components should be configured on the Cisco Secure Email Gateway appliance to achieve this? (Choose two.)

Options:

A.

DMARC verification profile

B.

SPF record

C.

Public/Private keypair

D.

Domain signing profile

E.

PKI certificate

Question 7

An organization has a strict policy on URLs embedded in emails. The policy allows visibility into what the URL is but does not allow the user to click it. Which action must be taken to meet the requirements of the security policy?

Options:

A.

Enable the URL quarantine policy

B.

Defang the URL.

C.

Replace the URL with text

D.

Redirect the URL to the Cisco security proxy

Question 8

Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?

Options:

A.

Add an additional mapping for attachment type for zip files.

B.

Enable assume match pattern if the email was not scanned for any reason.

C.

Increase the maximum recursion depth from 5 to a larger value.

D.

Increase the maximum attachment size to scan to a larger value.

Question 9

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

Options:

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

Question 10

The company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data Users must be able to flag the messages that require encryption versus a Cisco Secure Email Gateway appliance scanning all messages and automatically encrypting via detection Which action enables this capability?

Options:

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

Question 11

What are two primary components of content filters? (Choose two.)

Options:

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Question 12

What is the purpose of Cisco Email Encryption on Cisco ESA?

Options:

A.

to ensure anonymity between a recipient and MTA

B.

to ensure integrity between a sender and MTA

C.

to authenticate direct communication between a sender and Cisco ESA

D.

to ensure privacy between Cisco ESA and MTA

Question 13

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

Options:

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

Question 14

Which two features are applied to either incoming or outgoing mail policies? (Choose two.)

Options:

A.

Indication of Compromise

B.

application filtering

C.

outbreak filters

D.

sender reputation filtering

E.

antivirus

Question 15

What are two phases of the Cisco ESA email pipeline? (Choose two.)

Options:

A.

reject

B.

workqueue

C.

action

D.

delivery

E.

quarantine

Question 16

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

Options:

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Question 17

Which Cisco ESA security service is configured only through an outgoing mail policy?

Options:

A.

antivirus

B.

DLP

C.

Outbreak Filters

D.

AMP

Question 18

Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?

Options:

A.

Basic Authentication

B.

No Authentication

C.

Microsoft 365 Authentication

D.

Cisco Security Cloud Sign On

Question 19

Which component must be added to the content filter to trigger on failed SPF Verification or DKIM Authentication verdicts?

Options:

A.

status

B.

response

C.

parameter

D.

condition

Question 20

Refer to the exhibit. An engineer needs to change the existing Forged Email Detection message filter so that it references a newly created dictionary named ‘Executives’.

What should be done to accomplish this task?

Options:

A.

Change "from" to "Executives".

B.

Change "TESF to "Executives".

C.

Change fed' to "Executives".

D.

Change "support" to "Executives".

Question 21

Refer to the exhibits. What must be done to enforce end user authentication before accessing quarantine?

Options:

A.

Enable SPAM notification and use LDAP for authentication.

B.

Enable SPAM Quarantine Notification and add the %quarantine_url% variable.

C.

Change the end user quarantine access from None authentication to SAAS.

D.

Change the end user quarantine access setting from None authentication to Mailbox.

Question 22

When the spam quarantine is configured on the Cisco Secure Email Gateway, which type of query is used to validate non administrative user access to the end-user quarantine via LDAP?

Options:

A.

spam quarantine end-user authentication

B.

spam quarantine alias consolidation

C.

spam quarantine external authorization

D.

local mailbox (IMAP/POP) authentication

Question 23

Email encryption is configured on a Cisco ESA that uses CRES.

Which action is taken on a message when CRES is unavailable?

Options:

A.

It is requeued.

B.

It is sent in clear text.

C.

It is dropped and an error message is sent to the sender.

D.

It is encrypted by a Cisco encryption appliance.

Question 24

Drag and drop the Cisco ESA reactions to a possible DLP from the left onto the correct action types on the right.

Options:

Question 25

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

Options:

A.

SenderBase Reputation Filtering

B.

Connection Reputation Filtering

C.

Talos Reputation Filtering

D.

SpamCop Reputation Filtering

Question 26

An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?

Options:

A.

Configure the outbound firewall rule to permit traffic on port 8081

B.

Enable the Use HTTP option under Advanced Settings for File Reputation.

C.

Enable the Use SSL option under Advanced Settings for File Reputation.

D.

Configure the outbound firewall rule to permit traffic on port 3237

E.

TP/HTTPS ports outbound and notices that the AMP file reputation

Question 27

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

Options:

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Question 28

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

Options:

A.

83

B.

82

C.

443

D.

80

Question 29

Refer to the exhibit.

An administrator has configured File Reputation and File Analysis on the Cisco Secure Email Gateway appliance however it does not function as expected What must be configured on the appliance for this to function?

Options:

A.

Upload the Root CA certificate for the File Reputation cloud to the Cisco Secure Email Gateway.

B.

Open port 443 on the firewall for the Cisco Secure Email Gateway to connect to the File Reputation cloud.

C.

Configure the Cisco Secure Email Gateway to use SSL for the connection to the File Reputation server

D.

Restart the File Reputation service to force the scanning engine to connect to the File Reputation cloud.

Question 30

An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)

Options:

A.

domains

B.

senders

C.

reputation score

D.

receivers

E.

spf check

Question 31

Refer to the exhibit.

Which SPF record is valid for mycompany.com?

Options:

A.

v=spf1 a mx ip4:199.209.31.2 -all

B.

v=spf1 a mx ip4:10.1.10.23 -all

C.

v=spf1 a mx ip4:199.209.31.21 -all

D.

v=spf1 a mx ip4:172.16.18.230 -all

Question 32

Email encryption is configured on a Cisco ESA that uses CRES.

Which action is taken on a message when CRES is unavailable?

Options:

A.

It is requeued.

B.

It is sent in clear text.

C.

It is dropped and an error message is sent to the sender.

D.

It is encrypted by a Cisco encryption appliance.

Question 33

Refer to the exhibit.

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

Options:

A.

skip-filters

B.

log-entry

C.

spf-status

D.

quarantine

Question 34

Which process is skipped when an email is received from safedomain.com, which is on the safelist?

Options:

A.

message filter

B.

antivirus scanning

C.

outbreak filter

D.

antispam scanning

Question 35

What are organizations trying to address when implementing a SPAM quarantine?

Options:

A.

true positives

B.

false negatives

C.

false positives

D.

true negatives

Question 36

What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?

Options:

A.

provisioned email encryption profile

B.

message encryption from a content filter that select "Message Encryption" over TLS

C.

message encryption from the mail flow policies with "CRES" selected

D.

content filter to forward the email to the Cisco Registered Envelope server

Question 37

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Question 38

Drag and drop the AsyncOS methods for performing DMARC verification from the left into the correct order on the right.

Options:

Question 39

When the Cisco ESA is configured to perform antivirus scanning, what is the default timeout value?

Options:

A.

30 seconds

B.

90 seconds

C.

60 seconds

D.

120 seconds

Question 40

Which setting affects the aggressiveness of spam detection?

Options:

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Question 41

What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

Options:

A.

8025

B.

6443

C.

6025

D.

8443

Question 42

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

Options:

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

Question 43

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

Options:

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

Question 44

A Cisco Secure Email Gateway appliance is processing many messages that are sent to invalid recipients verification. Which two steps are required to accomplish this task? (Choose two.)

Options:

A.

Enable external LDAP authentication

B.

Configure the LDAP query on a listener

C.

Configure LDAP server profiles

D.

Enable LDAP authentication on a listener

E.

Configure incoming mail policy to query LDAP server

Page: 1 / 11
Total 147 questions