Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Cisco 300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) Exam Practice Test

Demo: 44 questions
Total 147 questions

Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Question 1

What is a valid content filter action?

Options:

A.

decrypt on delivery

B.

quarantine

C.

skip antispam

D.

archive

Question 2

Which benefit does enabling external spam quarantine on Cisco SMA provide?

Options:

A.

ability to back up spam quarantine from multiple Cisco ESAs to one central console

B.

access to the spam quarantine interface on which a user can release, duplicate, or delete

C.

ability to scan messages by using two engines to increase a catch rate

D.

ability to consolidate spam quarantine data from multiple Cisco ESA to one central console

Question 3

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

Options:

A.

SenderBase Reputation Filtering

B.

Connection Reputation Filtering

C.

Talos Reputation Filtering

D.

SpamCop Reputation Filtering

Question 4

Refer to the exhibit.

Which SPF record is valid for mycompany.com?

Options:

A.

v=spf1 a mx ip4:199.209.31.2 -all

B.

v=spf1 a mx ip4:10.1.10.23 -all

C.

v=spf1 a mx ip4:199.209.31.21 -all

D.

v=spf1 a mx ip4:172.16.18.230 -all

Question 5

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Question 6

Refer to the exhibit. What is the correct order of commands to set filter 2 to active?

Options:

A.

filters-> edit-> 2-> Active

B.

filters-> modify-> All-> Active

C.

filters-> detail-> 2-> 1

D.

filters-> set-> 2-> 1

Question 7

A Cisco Secure Email Gateway administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?

Options:

A.

Accept

B.

Delay

C.

Relay

D.

Reject

Question 8

Drag and drop the AsyncOS methods for performing DMARC verification from the left into the correct order on the right.

Options:

Question 9

An email containing a URL passes through the Cisco ESA that has content filtering disabled for all mail policies. The sender is sampleuser@test1.com, the recipients are testuser1@test2.com, testuser2@test2.com, testuser3@test2.com, and mailer1@test2.com. The subject of the email is Test Document395898847. An administrator wants to add a policy to ensure that the Cisco ESA evaluates the web reputation score before permitting this email.

Which two criteria must be used by the administrator to achieve this? (Choose two.)

Options:

A.

Subject contains Test Document"

B.

Sender matches test1.com

C.

Email body contains a URL

D.

Date and time of email

E.

Email does not match mailer1@test2.com

Question 10

An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Cisco ESA should be used to achieve this?

Options:

A.

incoming mail policies

B.

safelist

C.

blocklist

D.

S/MIME Sending Profile

Question 11

An engineer is tasked with creating a content filter to catch attachments, including credit card numbers, and hold them for review until further action is taken. Which component on a Cisco Secure Email Gateway must be configured to meet this requirement?

Options:

A.

Spam Quarantine

B.

Policy Quarantine

C.

Outbreak Filter

D.

Content Filter

Question 12

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: must be entered. What must be added to the dictionary to accomplish this goal?

Options:

A.

example.com

B.

Example CEO

C.

ceo

D.

ceo@example com

Question 13

Refer to the exhibit. How should this configuration be modified to stop delivering Zero Day malware attacks?

Options:

A.

Change Unscannable Action from Deliver As Is to Quarantine.

B.

Change File Analysis Pending action from Deliver As Is to Quarantine.

C.

Configure mailbox auto-remediation.

D.

Apply Prepend on Modify Message Subject under Malware Attachments.

Question 14

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

Options:

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

Question 15

An administrator needs to configure Cisco ESA to ensure that emails are sent and authorized by the owner of the domain. Which two steps must be performed to accomplish this task? (Choose two.)

Options:

A.

Generate keys.

B.

Create signing profile.

C.

Create Mx record.

D.

Enable SPF verification.

E.

Create DMARC profile.

Question 16

Which SMTP extension does Cisco ESA support for email security?

Options:

A.

ETRN

B.

UTF8SMTP

C.

PIPELINING

D.

STARTTLS

Question 17

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

Options:

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Question 18

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

Options:

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

Question 19

An engineer is configuring an SMTP authentication profile on a Cisco ESA which requires certificate verification.

Which section must be configured to accomplish this goal?

Options:

A.

Mail Flow Policies

B.

Sending Profiles

C.

Outgoing Mail Policies

D.

Verification Profiles

Question 20

How does the graymail safe unsubscribe feature function?

Options:

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Question 21

What are two primary components of content filters? (Choose two.)

Options:

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Question 22

Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)

Options:

A.

Paste in the Registration Token generated from the Smart Licensing Account

B.

Enable the Threat Response service under Network>Cloud Service Settings.

C.

Select the correct Threat Response Server based on your region.

D.

Paste in the Registration Token generated from the Security Services Exchange.

E.

Enable the Security Services Exchange service under Network>Cloud Service Settings

Question 23

An administrator must ensure that emails sent from cisco_123@externally.com are routed through an alternate virtual gateway. Drag and drop the snippet from the bottom onto the blank in the graphic to finish the message filter syntax. Not all snippets are used.

Options:

Question 24

An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?

Options:

A.

Configure the outbound firewall rule to permit traffic on port 8081

B.

Enable the Use HTTP option under Advanced Settings for File Reputation.

C.

Enable the Use SSL option under Advanced Settings for File Reputation.

D.

Configure the outbound firewall rule to permit traffic on port 3237

E.

TP/HTTPS ports outbound and notices that the AMP file reputation

Question 25

What are organizations trying to address when implementing a SPAM quarantine?

Options:

A.

true positives

B.

false negatives

C.

false positives

D.

true negatives

Question 26

A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?

Options:

A.

Non-Viral threat detection requires Antivirus or AMP enablement to properly function

B.

The Outbreak Filters option Graymail Header must be enabled

C.

Non-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function.

D.

The Outbreak Filters option URL Rewriting must be enabled.

Question 27

An administrator is trying to enable centralized PVO but receives the error, "Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters / DLP actions available at a level different from the cluster level."

What is the cause of this error?

Options:

A.

Content filters are configured at the machine-level on esa1.

B.

DLP is configured at the cluster-level on esa2.

C.

DLP is configured at the domain-level on esa1.

D.

DLP is not configured on host1.

Question 28

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

Options:

A.

default

B.

system

C.

user

D.

custom

E.

demo

Question 29

Which two configurations are used on multiple LDAP servers to connect with Cisco ESA? (Choose two.)

Options:

A.

load balancing

B.

SLA monitor

C.

active-standby

D.

failover

E.

active-active

Question 30

An organization wants to prevent proprietary patent documents from being shared externally via email. The network administrator reviewed the DLP policies on the Cisco Secure Email Gateway and could not find an existing policy with the appropriate matching patterns. Which type of DLP policy template must be used to create a policy that meets this requirement?

Options:

A.

privacy protection

B.

custom policy

C.

regulatory compliance

D.

acceptable use

Question 31

An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)

Options:

A.

domains

B.

senders

C.

reputation score

D.

receivers

E.

spf check

Question 32

Spammers routinely try to send emails with the recipient field filled with a list of all possible combinations of letters and numbers. These combinations, appended with a company domain name are malicious attempts at learning all possible valid email addresses. Which action must be taken on a Cisco Secure Email Gateway to prevent this from occurring?

Options:

A.

Select the SMTP Authentication Query checkbox

B.

Perform LDAP acceptance validation.

C.

Quarantine external authentication queries.

D.

Enable end user safelist features

Question 33

A Cisco Secure Email Gateway appliance is processing many messages that are sent to invalid recipients verification. Which two steps are required to accomplish this task? (Choose two.)

Options:

A.

Enable external LDAP authentication

B.

Configure the LDAP query on a listener

C.

Configure LDAP server profiles

D.

Enable LDAP authentication on a listener

E.

Configure incoming mail policy to query LDAP server

Question 34

A security administrator deployed a Cisco Secure Email Gateway appliance with a mail policy configured to store suspected spam for review. The appliance is the DMZ and only the standard HTTP/HTTPS ports are allowed by the firewall. An administrator wants to ensure that users can view any suspected spam that was blocked. Which action must be taken to meet this requirement?

Options:

A.

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

B.

Enable the Spam Quarantine and leave the default settings unchanged.

C.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

D.

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

Question 35

When DKIM signing is configured, which DNS record must be updated to load the DKIM public signing key?

Options:

A.

AAAA record

B.

PTR record

C.

TXT record

D.

MX record

Question 36

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

Options:

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

Question 37

What is a valid content filter action?

Options:

A.

decrypt on delivery

B.

quarantine

C.

skip antispam

D.

archive

Question 38

The CEO added a sender to a safelist but does not receive an important message expected from the trusted sender. An engineer evaluates message tracking on the Cisco Secure Email Gateway appliance and determines that the message was dropped by the antivirus engine. What is the reason for this behavior?

Options:

A.

The sender is included in an ISP blocklist

B.

Administrative access is required to create a safelist.

C.

The sender didn't mark the message as urgent

D.

End-user safelists apply to antispam engines only.

Question 39

A list of company executives is routinely being spoofed, which puts the company at risk of malicious email attacks An administrator must ensure that executive messages are originating from legitimate sending addresses Which two steps must be taken to accomplish this task? (Choose two.)

Options:

A.

Create an incoming content filter with SPF detection.

B.

Enable the Forged Email Detection feature under Security Settings.

C.

Enable DMARC feature under Mail Policies.

D.

Create an incoming content filter with the Forged Email Detection condition

E.

Create a content dictionary including a list of the names that are being spoofed.

Question 40

An organization wants to designate help desk personnel to assist with tickets that request the release of messages from the spam quarantine because company policy does not permit direct end-user access to the quarantine. Which two roles must be used to allow help desk personnel to release messages while restricting their access to make configuration changes in the Cisco Secure Email Gateway? (Choose two.)

Options:

A.

Administrator

B.

Help Desk User

C.

Read-Only Operator

D.

Technician

E.

Quarantine Administrator

Question 41

Email encryption is configured on a Cisco ESA that uses CRES.

Which action is taken on a message when CRES is unavailable?

Options:

A.

It is requeued.

B.

It is sent in clear text.

C.

It is dropped and an error message is sent to the sender.

D.

It is encrypted by a Cisco encryption appliance.

Question 42

What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

Options:

A.

8025

B.

6443

C.

6025

D.

8443

Question 43

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)

Options:

A.

DKIM

B.

Public Keys

C.

Domain Keys

D.

Symmetric Keys

E.

Private Keys

Question 44

Drag and drop authentication options for End-User Quarantine Access from the left onto the corresponding configuration steps on the right.

Options:

Demo: 44 questions
Total 147 questions