Month End Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

Cisco 300-720 Dumps

Page: 1 / 15
Total 147 questions

Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Question 1

A network engineer must tighten up the SPAM control policy of an organization due to a recent SPAM attack. In which scenario does enabling regional scanning improve security for this organization?

Options:

A.

when most of the received spam comes from a specific country

B.

when most of the received spam originates outside of the U.S.

C.

when most of the received email originates outside of the U.S.

D.

when most of the received email originates from a specific region

Question 2

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

Options:

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Question 3

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: must be entered. What must be added to the dictionary to accomplish this goal?

Options:

A.

example.com

B.

Example CEO

C.

ceo

D.

ceo@example com

Question 4

Which attack is mitigated by using Bounce Verification?

Options:

A.

spoof

B.

denial of service

C.

eavesdropping

D.

smurf

Question 5

as

Refer to the exhibit. What is the correct order of commands to set filter 2 to active?

Options:

A.

filters-> edit-> 2-> Active

B.

filters-> modify-> All-> Active

C.

filters-> detail-> 2-> 1

D.

filters-> set-> 2-> 1

Question 6

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

Options:

A.

83

B.

82

C.

443

D.

80

Question 7

The CEO sent an email indicating that all emails containing a string of 123ABCDEFGHJ cannot be delivered and must be sent into quarantine for further inspection. Given the requirement, which regular expression should be used to match on that criteria?

Options:

A.

\\D{3}[A-Z]{9}

B.

\d{3}[A-Z]{9}

C.

\W{3}[A-Z]{9}

D.

{3}\d{9}[A-Z]

Question 8

What are two primary components of content filters? (Choose two.)

Options:

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Question 9

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

Options:

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

Question 10

as

Refer to the exhibit. How should this configuration be modified to stop delivering Zero Day malware attacks?

Options:

A.

Change Unscannable Action from Deliver As Is to Quarantine.

B.

Change File Analysis Pending action from Deliver As Is to Quarantine.

C.

Configure mailbox auto-remediation.

D.

Apply Prepend on Modify Message Subject under Malware Attachments.

Question 11

Spreadsheets containing credit card numbers are being allowed to bypass the Cisco ESA.

Which outgoing mail policy feature should be configured to catch this content before it leaves the network?

Options:

A.

file reputation filtering

B.

outbreak filtering

C.

data loss prevention

D.

file analysis

Question 12

An engineer must provide differentiated email filtering to executives within the organization Which two actions must be taken to accomplish this task? (Choose two)

Options:

A.

Define an LDAP group query to specify users to whom the mail policy rules apply.

B.

Create content filters for actions to take on messages that contain specific data

C.

Upload a csv file containing the email addresses for the users for whom you want to create mail policies.

D.

Enable the content-scanning features you want to use with mail policies

E.

Define the default mail policies for incoming or outgoing messages

Question 13

Drag and drop authentication options for End-User Quarantine Access from the left onto the corresponding configuration steps on the right.

as

Options:

Question 14

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

Options:

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

Question 15

Refer to the exhibit.

as

For improved security, an administrator wants to warn users about opening any links or attachments within an email How must the administrator configure an HTML-coded message at the top of an email body to create this warning?

Options:

A.

Create a text resource type of Disclaimer Template paste the HTML code into the text box. then use this text resource inside a content filter

B.

Create a text resource type of Disclaimer Template change to code view to paste the HTML code into the text box, then use this text resource inside a content filter

C.

Create a text resource type of Notification Template, paste the HTML code into the text box, then use this text resource inside a content filter.

D.

Create a text resource type of Notification Template, change to code view to paste the HTML code into the text box. then use this text resource inside a content filter.

Question 16

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

Options:

A.

SenderBase Reputation Filtering

B.

Connection Reputation Filtering

C.

Talos Reputation Filtering

D.

SpamCop Reputation Filtering

Question 17

Which setting affects the aggressiveness of spam detection?

Options:

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Question 18

Which two components form the graymail management solution in Cisco ESA? (Choose two.)

Options:

A.

cloud-based unsubscribe service

B.

uniform unsubscription management interface for end users

C.

secure subscribe option for end users

D.

integrated graymail scanning engine

E.

improved mail efficacy

Question 19

The company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data Users must be able to flag the messages that require encryption versus a Cisco Secure Email Gateway appliance scanning all messages and automatically encrypting via detection Which action enables this capability?

Options:

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

Question 20

Refer to the exhibit.

as

Which additional configuration action must be taken to protect against Directory Harvest Attacks?

Options:

A.

When LDAP Queries are configured, Directory Harvest Attack Prevention is enabled by default.

B.

In the LDAP Server profile, configure Directory Harvest Attack Prevention

C.

In the mail flow policy, configure Directory Harvest Attack Prevention.

D.

In the Listener Settings, modify the LDAP Queries configuration to use the Work Queue

Question 21

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

Options:

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

Question 22

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

Options:

A.

SenderBase Reputation Filtering

B.

Connection Reputation Filtering

C.

Talos Reputation Filtering

D.

SpamCop Reputation Filtering

Question 23

Which Cisco ESA security service is configured only through an outgoing mail policy?

Options:

A.

antivirus

B.

DLP

C.

Outbreak Filters

D.

AMP

Question 24

What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

Options:

A.

8025

B.

6443

C.

6025

D.

8443

Question 25

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

Options:

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

Question 26

A Cisco Secure Email Gateway administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?

Options:

A.

Accept

B.

Delay

C.

Relay

D.

Reject

Question 27

Which action on the Cisco ESA provides direct access to view the safelist/blocklist?

Options:

A.

Show the SLBL cache on the CLI.

B.

Monitor Incoming/Outgoing Listener.

C.

Export the SLBL to a .csv file.

D.

Debug the mail flow policy.

Question 28

An administrator must ensure that emails sent from cisco_123@externally.com are routed through an alternate virtual gateway. Drag and drop the snippet from the bottom onto the blank in the graphic to finish the message filter syntax. Not all snippets are used.

as

Options:

Question 29

Which type of attack is prevented by configuring file reputation filtering and file analysis features?

Options:

A.

denial of service

B.

zero-day

C.

backscatter

D.

phishing

Question 30

How does the graymail safe unsubscribe feature function?

Options:

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Question 31

An engineer wants to utilize a digital signature in outgoing emails to validate to others that the email they are receiving was indeed sent and authorized by the owner of that domain Which two components should be configured on the Cisco Secure Email Gateway appliance to achieve this? (Choose two.)

Options:

A.

DMARC verification profile

B.

SPF record

C.

Public/Private keypair

D.

Domain signing profile

E.

PKI certificate

Question 32

An email containing a URL passes through the Cisco ESA that has content filtering disabled for all mail policies. The sender is sampleuser@test1.com, the recipients are testuser1@test2.com, testuser2@test2.com, testuser3@test2.com, and mailer1@test2.com. The subject of the email is Test Document395898847. An administrator wants to add a policy to ensure that the Cisco ESA evaluates the web reputation score before permitting this email.

Which two criteria must be used by the administrator to achieve this? (Choose two.)

Options:

A.

Subject contains Test Document"

B.

Sender matches test1.com

C.

Email body contains a URL

D.

Date and time of email

E.

Email does not match mailer1@test2.com

Question 33

What is the default behavior of any listener for TLS communication?

Options:

A.

preferred-verify

B.

off

C.

preferred

D.

required

Question 34

Which setting affects the aggressiveness of spam detection?

Options:

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Question 35

Which two steps configure Forged Email Detection? (Choose two.)

Options:

A.

Configure a content dictionary with executive email addresses.

B.

Configure a filter to use the Forged Email Detection rule and dictionary.

C.

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.

Enable Forged Email Detection on the Security Services page.

E.

Configure a content dictionary with friendly names.

Question 36

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

Options:

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Question 37

An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?

Options:

A.

Configure the outbound firewall rule to permit traffic on port 8081

B.

Enable the Use HTTP option under Advanced Settings for File Reputation.

C.

Enable the Use SSL option under Advanced Settings for File Reputation.

D.

Configure the outbound firewall rule to permit traffic on port 3237

E.

TP/HTTPS ports outbound and notices that the AMP file reputation

Question 38

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

Options:

A.

default

B.

system

C.

user

D.

custom

E.

demo

Question 39

Refer to the exhibit.

as

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

Options:

A.

skip-filters

B.

log-entry

C.

spf-status

D.

quarantine

Question 40

An Encryption Profile has been set up on the Cisco ESA.

Drag and drop the steps from the left for creating an outgoing content filter to encrypt emails that contains the subject "Secure:" into the correct order on the right.

as

Options:

Question 41

When DKIM signing is configured, which DNS record must be updated to load the DKIM public signing key?

Options:

A.

AAAA record

B.

PTR record

C.

TXT record

D.

MX record

Question 42

Drag and drop the graymail descriptions from the left onto the verdict categories they belong to on the right.

as

Options:

Question 43

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Question 44

When the spam quarantine is configured on the Cisco Secure Email Gateway, which type of query is used to validate non administrative user access to the end-user quarantine via LDAP?

Options:

A.

spam quarantine end-user authentication

B.

spam quarantine alias consolidation

C.

spam quarantine external authorization

D.

local mailbox (IMAP/POP) authentication

Page: 1 / 15
Total 147 questions