Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Cisco 300-720 Dumps Questions Answers

Page: 1 / 14
Total 190 questions

Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Question 1

Drag and drop the steps to configure Cisco ESA to use SPF/SIDF verification from the left into the correct order on the right.

Options:

Buy Now
Question 2

The company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data Users must be able to flag the messages that require encryption versus a Cisco Secure Email Gateway appliance scanning all messages and automatically encrypting via detection Which action enables this capability?

Options:

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

Question 3

An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)

Options:

A.

domains

B.

senders

C.

reputation score

D.

receivers

E.

spf check

Question 4

What occurs when configuring separate incoming mail policies?

Options:

A.

message splintering

B.

message exceptions

C.

message detachment

D.

message aggregation

Question 5

The CEO sent an email indicating that all emails containing a string of 123ABCDEFGHJ cannot be delivered and must be sent into quarantine for further inspection. Given the requirement, which regular expression should be used to match on that criteria?

Options:

A.

\\D{3}[A-Z]{9}

B.

\d{3}[A-Z]{9}

C.

\W{3}[A-Z]{9}

D.

{3}\d{9}[A-Z]

Question 6

What is a capability of content filters?

Options:

A.

to review messages based on email subject

B.

to scan incoming or outgoing messages

C.

to apply rules before message filters

D.

to perform antispam scanning

Question 7

An organization wants to designate help desk personnel to assist with tickets that request the release of messages from the spam quarantine because company policy does not permit direct end-user access to the quarantine. Which two roles must be used to allow help desk personnel to release messages while restricting their access to make configuration changes in the Cisco Secure Email Gateway? (Choose two.)

Options:

A.

Administrator

B.

Help Desk User

C.

Read-Only Operator

D.

Technician

E.

Quarantine Administrator

Question 8

Refer to the exhibit. An engineer is trying to connect to a Cisco E SA using SSH and has been unsuccessful. Upon further inspection, the engineer notices that there is a loss of connectivity to the neighboring switch.

Which connection method should be used to determine the configuration issue?

Options:

A.

Telnet

B.

HTTPS

C.

Ethernet

D.

serial

Question 9

An administrator identifies tha t, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Ci sco ESA should be used to achieve this?

Options:

A.

incoming mail policies

B.

safelist

C.

blocklist

D.

S/MIME Sending Profile

Question 10

An engineer must configure incoming message verification using DM ARC in Cisco Secure Email Gateway. Emails from VP@cisco.com must skip the verification Drag and drop the actions from the left into the sequence on the right to meet the requirement.

Options:

Question 11

Which type of DNS record would contain the following line, which references the DKIM public key per RFC 6376?

v=DKIM1; p=76E629F05F709EF665853333EEC3F5ADE69A2362BECE406582670456943283BE

Options:

A.

CNAME

B.

AAAA

C.

TXT

D.

PTR

Question 12

A security administrator deployed a Cisco Secure Email Gateway appliance with a mail policy configured to store suspected spam for review. The appliance is the DMZ and only the standard HTTP/HTTPS ports are allowed by the firewall. An administrator wants to ensure that users can view any suspected spam that was blocked. Which action must be taken to meet this requirement?

Options:

A.

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

B.

Enable the Spam Quarantine and leave the default settings unchanged.

C.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

D.

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

Question 13

What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

Options:

A.

8025

B.

6443

C.

6025

D.

8443

Question 14

An engineer must enable SIDF for a mail flow policy on an incoming listener in Cisco Secure Email Gateway. Drag and drop the actions from the left into the sequence on the right to meet the requirement.

Options:

Question 15

A Cisco Secure Email Gateway appliance is processing many messages that are sent to invalid recipients verification. Which two steps are required to accomplish this task? (Choose two.)

Options:

A.

Enable external LDAP authentication

B.

Configure the LDAP query on a listener

C.

Configure LDAP server profiles

D.

Enable LDAP authentication on a listener

E.

Configure incoming mail policy to query LDAP server

Question 16

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

Options:

A.

DHAP

B.

SBRS

C.

LDAP

D.

SMTP

Question 17

A trusted partner of an organization recently experienced a new campaign that was leveraging JavaScript attachments to trick users into executing malware. As a result, they created a local policy to deny messages with JavaScript attachments. Which action should the administrator of the organization take to ensure encrypted communications are delivered to the intended partner recipient?

Options:

A.

Insert the X-PostX-Use-Script ' header with a value of false to the encrypted messages

B.

Select JavaScript-free ' option within the Cisco Secure Email Encryption Service Add-in

C.

Create an outgoing content filter and add the Encrypt and Deliver Nov/ action with Use-Script option deselected

D.

Create a new encryption profile and deselect the ' Use-Script ' envelope settings option.

Question 18

An engineer must implement policies in Cisco Secure Email Gateway to prevent suspicious spam messages from being delivered to executives group. Messages that arrive from public email addresses from the yahoo.com or gmail.com domains must be redirected to the IT department. Which two configuration actions must be taken to meet the requirement? (Choose two.)

Options:

A.

Add a mail policy to match the sender domains as @ yahoo com and @ gmail com.

B.

Configure the policy to match executive recipients either via email address or LDAP group.

C.

Implement a mail policy to match the sender domains as recipients as ©executives.com.

D.

Set up a mail policy to match the sender domains as senders as ' yahoo com and *gmail.com

E.

Apply a mail policy to match the sender domains as senders not as ©executives com.

Question 19

What are two phases of the Cisco ESA email pipeline? (Choose two.)

Options:

A.

reject

B.

workqueue

C.

action

D.

delivery

E.

quarantine

Question 20

An engineer must integrate Cisco Secure Email with the Cisco Secure Endpoint console. Which two settings must be configured to prevent zero-day threats? (Choose two.)

Options:

A.

File Reputation Filtering

B.

Message Filters

C.

Content Filter Settings

D.

Undesirable URL Settings

E.

File Analysis

Question 21

Refer to the exhibit. How should this configuration be modified to stop delivering Zero Day malware attacks?

Options:

A.

Change Unscannable Action from Deliver As Is to Quarantine.

B.

Change File Analysis Pending action from Deliver As Is to Quarantine.

C.

Configure mailbox auto-remediation.

D.

Apply Prepend on Modify Message Subject under Malware Attachments.

Question 22

Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)

Options:

A.

Paste in the Registration Token generated from the Smart Licensing Account

B.

Enable the Threat Response service under Network > Cloud Service Settings.

C.

Select the correct Threat Response Server based on your region.

D.

Paste in the Registration Token generated from the Security Services Exchange.

E.

Enable the Security Services Exchange service under Network > Cloud Service Settings

Question 23

A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?

Options:

A.

Non-Viral threat detection requires Antivirus or AMP enablement to properly function

B.

The Outbreak Filters option Graymail Header must be enabled

C.

Non-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function.

D.

The Outbreak Filters option URL Rewriting must be enabled.

Question 24

Refer to the exhibit. How does the Cisco Secure Email Gateway handle an email with an unknown Microsoft Word document?

Options:

A.

The email is quarantined.

B.

The email is dropped.

C.

The file is sent to the cloud for file analysis.

D.

The email is delivered without file analysis.

Question 25

An engineer must configure a policy quarantine in Cisco Secure Email Gateway. The retention time must be 7 days and user@cisco.com must have access to the quarantine. Drag and drop the actions from the left into the sequence on the right to meet the requirements.

Options:

Question 26

A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.

What is the reason of this?

Options:

A.

The Tram* header is checked against all policies in a top-down fashion.

B.

The message header with the highest priority is checked ag ainst each policy in a top-down fashion.

C.

The To " header is checked against all policies in a top-down fashion.

D.

The message header with the highest priority is checked against the Default policy in a top-down fashion.

Question 27

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

Options:

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Question 28

Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?

Options:

A.

traffic between the Cisco Secure Email Gateway and the LDAP server

B.

emails being delivered from the Cisco Secure Email Gateway

C.

HTTPS traffic when connecting to the web user interface of the Cisco Secure Email Gateway

D.

emails being received by the Cisco Secure Email Gateway

Question 29

When URL logging is configured on a Cisco ESA, which feature must be enabled first?

Options:

A.

antivirus

B.

antispam

C.

virus outbreak filter

D.

senderbase reputation filter

Question 30

Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?

Options:

A.

Add an additional mapping for attachment type for zip files.

B.

Enable assume match pattern if the email was not scanned for any reason.

C.

Increase the maximum recursion depth from 5 to a larger value.

D.

Increase the maximum attachment size to scan to a larger value.

Question 31

A list of company executives is routinely being spoofed, which puts the company at risk of malicious email attacks An administrator must ensure that executive messages are originating from legitimate sending addresses Which two steps must be taken to accomplish this task? (Choose two.)

Options:

A.

Create an incoming content filter with SPF detection.

B.

Enable the Forged Email Detection feature under Security Settings.

C.

Enable DMARC feature under Mail Policies.

D.

Create an incoming content filter with the Forged Email Detection condition

E.

Create a content dictionary including a list of the names that are being spoofed.

Question 32

An email administrator must configure DLP policies on the Cisco Secure Email Gateway. The DLP policies must be added to the default outgoing mail policy. How is this task accomplished?

Options:

A.

Create a recipient group for the DLP policies and apply it to the default outgoing mail policy.

B.

Remove DLP policies with the same severity level prior to leveraging the DLP Assessment Wizard

C.

Create a classifier to match specific content within a predefined DLP policy template

D.

Remove all existing DLP policies prior to leveraging the DLP Assessment Wizard.

Question 33

An engineer is tasked with reviewing mail logs to confirm that messages sent from domain abc.com are passing SPF verification and being accepted by the Cisco ESA. The engineer notices that SPF veri fication is not being performed and that SPF is not being referenced in the logs for messages sent from domain abc.com.

Why is the verification not working properly?

Options:

A.

SPF verification is disabled in the Recipient Access Table.

B.

SPF verification i s disabled on the Mail Flow Policy.

C.

The SPF conformance level is set to SIDF compatible on the Mail Flow Policy.

D.

An SPF verification Content Filter has not been created.

Question 34

An Encryption Profile has been set up on the Cisco ESA.

Drag and drop the steps from the left for creating an outgoing content filter to encrypt emails that contains the subject " Secure: " into the correct order on the right.

Options:

Question 35

An engineer must configure a local spam quarantine in Cisco Secure Email Gateway These configurations were already performed: •Enable the Anti-Spam feature and configure the quarantine settings •Specify the disk space to allocate to the spam quarantine.

Which two actions must be taken to complete the configuration? (Choose two.)

Options:

A.

Configure a mail policy.

B.

Enable Outbreak Filters.

C.

Set the quarantine threshold to 3

D.

Allow browser access

E.

Activate Outgoing Content Filters.

Question 36

Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.)

Options:

A.

The filters command executed from the CLI is used to configure the message filters.

B.

Message filters configuration within the web user interface is located within Incoming Content Filters.

C.

The filterconfig command executed from the CLI is used to configure message filters.

D.

Message filters can be configured only from the CLI.

E.

Message filters can be configured only from the web user interface.

Question 37

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Question 38

Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?

Options:

A.

A policy quarantine is missing.

B.

More than one email pipeline is defined.

C.

The " modify the message subject " is already set.

D.

The " add custom header " action is performed first.

Question 39

An organization wants to use its existing Cisco ESA to host a new domain and enforce a separate corporate policy for that domain.

What should be done on the Cisco ESA to achieve this?

Options:

A.

Use the smtproutes command to configure a SMTP route for the new domain.

B.

Use the deli very config command to configure mail delivery for the new domain.

C.

Use the dsestconf command to add a separate destination for the new domain.

D.

Use the altrchost command to add a separate gateway for the new domain.

Question 40

An administrator needs to configure Cisco ESA to ensure that emails are sent and authorized by th e owner of the domain. Which two steps must be performed to accomplish this task? (Choose two.)

Options:

A.

Generate keys.

B.

Create signing profile.

C.

Create Mx record.

D.

Enable SPF verification.

E.

Create DMARC profile.

Question 41

An admin istrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.

How is this accomplished?

Options:

A.

Disable the VOF feature before sending SPAM to the external quarantine.

B.

Configure a mail p olicy to determine whether the message is sent to the local or external quarantine.

C.

Disable the local quarantine before sending SPAM to the external quarantine.

D.

Configure a user policy to determine whether the message is sent to the local or exte rnal quarantine.

Question 42

A company ' s CFO is requesting the email administrator create an exception for graymail from a certain yoga studio ' s weekly newsletter. Which category of graymail does this fall under?

Options:

A.

Mass

B.

Marketing

C.

Social Network

D.

Sales

Question 43

An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?

Options:

A.

Configure the outbound firewall rule to permit traffic on port 8081

B.

Enable the Use HTTP option under Advanced Settings for File Reputation.

C.

Enable the Use SSL option under Advanced Settings for File Reputation.

D.

Configure the outbound firewall rule to permit traffic on port 3237

E.

TP/HTTPS ports outbound and notices that the AMP file reputation

Question 44

Drag and drop the actions from the left into the sequence on the right to configure directory harvest prevention in Cisco Secure Email Gateway.

Options:

Question 45

An administrator has cr eated a content filter to quarantine all messages that result in an SPF hardfail to review the messages and determine whether a trusted partner has accidentally misconfigured the DNS settings. The administrator sets the policy quarantine to release the mes sages after 24 hours, allowing time to review while not interrupting business.

Which additional option should be used to help the end users be aware of the elevated risk of interacting with these messages?

Options:

A.

Notify Recipient

B.

Strip Attachments

C.

Notify Sender

D.

Modify Subject

Question 46

A network administrator enabled McAfee antivirus scanning on a Cisco Secure Email Gateway and configured the virus scanning action of " scan for viruses only " If the scanner finds a virus in an attachment for an incoming email, what action will be applied to this message?

Options:

A.

The email and attachment are forwarded to the network administrator.

B.

No repair is attempted, and the attachment is either dropped or delivered

C.

The attachment is dropped and replaced with a " Removed Attachment " file

D.

The system will attempt to repair the attachment

Question 47

Users have been complaining of a higher volume of emails containing profanity. The network administrator will need to leverage dictionaries and create specific conditions to reduce the number of inappropriate emails.

Which two filters should be configured to a ddress this? (Choose two.)

Options:

A.

message

B.

spam

C.

VOF

D.

sender group

E.

content

Question 48

An engineer is configuring a Cisco Secure Email Gateway and needs to reject email messages to a recipient with email address user0516585210@acme.com . Which list contains the allowed recipient addresses?

Options:

A.

BAT

B.

HAT

C.

SAT

D.

RAT

Question 49

The CEO added a sender to a safelist but does not receive an important message expected from the trusted sender. An engineer evaluates message tracking on the Cisco Secure Email Gateway appliance and determines that the message was dropped by the antivirus engine. What is the reason for this behavior?

Options:

A.

The sender is included in an ISP blocklist

B.

Administrative access is required to create a safelist.

C.

The sender didn ' t mark the message as urgent

D.

End-user safelists apply to antispam engines only.

Question 50

What is the purpose of checking the CRL during SMTP authentication on a Cisco Secure Email Gateway?

Options:

A.

Validate the date to check if the certificate is still valid

B.

Check if the certificate is not revoked.

C.

Confirm that corresponding CA is present

D.

Verify the common name matches user ID

Question 51

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

Options:

A.

default

B.

system

C.

user

D.

custom

E.

demo

Question 52

An email containing a URL passes through the Cisco ESA that has content filtering disabled for all mail policies. The sender is sampleuser@test1.com, the recipients are testuser1@test2.com, testuser2@test2.com, testuser3@test2.com, and mailer1@te st2.com. The subject of the email is Test Document395898847. An administrator wants to add a policy to ensure that the Cisco ESA evaluates the web reputation score before permitting this email.

Which two criteria must be used by the administrator to achie ve this? (Choose two.)

Options:

A.

Subject contains Test Document "

B.

Sender matches test1.com

C.

Email body contains a URL

D.

Date and time of email

E.

Email does not match mailer1@test2.com

Question 53

Spreadsheets containing credit card numbers are being allowed to bypass the Cisco ESA.

Which outgoing mail policy feature should be configured to catch this content before it leaves the network?

Options:

A.

file reputation filtering

B.

outbreak filtering

C.

data loss prevention

D.

file analysis

Question 54

When the Cisco ESA is configured to perform antivirus scanning, what is the default timeout value?

Options:

A.

30 seconds

B.

90 seconds

C.

60 seconds

D.

120 seconds

Question 55

Which global setting is configured under Cisco ESA Scan Behavior?

Options:

A.

minimum attachment size to scan

B.

attachment scanning timeout

C.

actions for unscannable messages due to attachment type

D.

minimum depth of attachment recursion to scan

Question 56

A recent engine update was pulled down for graymail and has caused the service to start crashing. It is critical to fix this as quickly as possible.

What must be done to address this issue?

Options:

A.

Roll back to a previous version of the engine from the Services Overview page.

B.

Roll back to a previous version of the engine from the System Health page.

C.

Download another update from the IMS and Graymail page.

D.

Download another update from the Service Updat es page.

Question 57

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)

Options:

A.

DKIM

B.

Public Keys

C.

Domain Keys

D.

Symmetric Keys

E.

Private Keys

Page: 1 / 14
Total 190 questions