Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Securing Email with Cisco Email Security Appliance (300-720 SESA) Question and Answers

Securing Email with Cisco Email Security Appliance (300-720 SESA)

Last Update May 6, 2024
Total Questions : 147

We are offering FREE 300-720 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 300-720 free exam questions and then go for complete pool of Securing Email with Cisco Email Security Appliance (300-720 SESA) test questions that will help you more.

300-720 pdf

300-720 PDF

$38.5  $109.99
300-720 Engine

300-720 Testing Engine

$45.5  $129.99
300-720 PDF + Engine

300-720 PDF + Testing Engine

$59.5  $169.99
Questions 1

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

Options:

A.  

redirect

B.  

return

C.  

drop

D.  

delay

E.  

abandon

Discussion 0
Questions 2

Refer to the exhibit.

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

Options:

A.  

skip-filters

B.  

log-entry

C.  

spf-status

D.  

quarantine

Discussion 0
Questions 3

Which Cisco ESA security service is configured only through an outgoing mail policy?

Options:

A.  

antivirus

B.  

DLP

C.  

Outbreak Filters

D.  

AMP

Discussion 0
Questions 4

Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?

Options:

A.  

DER certificate and matching public key from a CA

B.  

self-signed certificate in PKCS#7 format

C.  

X. 509 certificate and matching private key from a CA

D.  

self-signed certificate in PKCS#12 format

Discussion 0
Questions 5

Drag and drop the AsyncOS methods for performing DMARC verification from the left into the correct order on the right.

Options:

Discussion 0
Questions 6

Which action on the Cisco ESA provides direct access to view the safelist/blocklist?

Options:

A.  

Show the SLBL cache on the CLI.

B.  

Monitor Incoming/Outgoing Listener.

C.  

Export the SLBL to a .csv file.

D.  

Debug the mail flow policy.

Discussion 0
Questions 7

What are organizations trying to address when implementing a SPAM quarantine?

Options:

A.  

true positives

B.  

false negatives

C.  

false positives

D.  

true negatives

Discussion 0
Questions 8

An organization wants to designate help desk personnel to assist with tickets that request the release of messages from the spam quarantine because company policy does not permit direct end-user access to the quarantine. Which two roles must be used to allow help desk personnel to release messages while restricting their access to make configuration changes in the Cisco Secure Email Gateway? (Choose two.)

Options:

A.  

Administrator

B.  

Help Desk User

C.  

Read-Only Operator

D.  

Technician

E.  

Quarantine Administrator

Discussion 0
Questions 9

Spreadsheets containing credit card numbers are being allowed to bypass the Cisco ESA.

Which outgoing mail policy feature should be configured to catch this content before it leaves the network?

Options:

A.  

file reputation filtering

B.  

outbreak filtering

C.  

data loss prevention

D.  

file analysis

Discussion 0
Questions 10

Which setting affects the aggressiveness of spam detection?

Options:

A.  

protection level

B.  

spam threshold

C.  

spam timeout

D.  

maximum depth of recursion scan

Discussion 0
Questions 11

Which benefit does enabling external spam quarantine on Cisco SMA provide?

Options:

A.  

ability to back up spam quarantine from multiple Cisco ESAs to one central console

B.  

access to the spam quarantine interface on which a user can release, duplicate, or delete

C.  

ability to scan messages by using two engines to increase a catch rate

D.  

ability to consolidate spam quarantine data from multiple Cisco ESA to one central console

Discussion 0
Questions 12

Which setting affects the aggressiveness of spam detection?

Options:

A.  

protection level

B.  

spam threshold

C.  

spam timeout

D.  

maximum depth of recursion scan

Discussion 0
Questions 13

A recent engine update was pulled down for graymail and has caused the service to start crashing. It is critical to fix this as quickly as possible.

What must be done to address this issue?

Options:

A.  

Roll back to a previous version of the engine from the Services Overview page.

B.  

Roll back to a previous version of the engine from the System Health page.

C.  

Download another update from the IMS and Graymail page.

D.  

Download another update from the Service Updates page.

Discussion 0
Questions 14

What is a valid content filter action?

Options:

A.  

decrypt on delivery

B.  

quarantine

C.  

skip antispam

D.  

archive

Discussion 0
Questions 15

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

Options:

A.  

message-ID

B.  

sender

C.  

URL reputation

D.  

from

E.  

mail-from

Discussion 0
Questions 16

Which two steps configure Forged Email Detection? (Choose two.)

Options:

A.  

Configure a content dictionary with executive email addresses.

B.  

Configure a filter to use the Forged Email Detection rule and dictionary.

C.  

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.  

Enable Forged Email Detection on the Security Services page.

E.  

Configure a content dictionary with friendly names.

Discussion 0
Questions 17

Drag and drop the graymail descriptions from the left onto the verdict categories they belong to on the right.

Options:

Discussion 0
Questions 18

A Cisco ESA administrator has noticed that new messages being sent to the Centralized Policy Quarantine are being released after one hour. Previously, they were being held for a day before being released.

What was configured that caused this to occur?

Options:

A.  

The retention period was changed to one hour.

B.  

The threshold settings were set to override the clock settings.

C.  

The retention period was set to default.

D.  

The threshold settings were set to default.

Discussion 0
Questions 19

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

Options:

A.  

Enabling the End-User Safelist/Blocklist feature

B.  

Spam Quarantine External Authentication Query

C.  

Spam Quarantine End-User Authentication Query

D.  

Spam Quarantine Alias Consolidation Query

Discussion 0
Questions 20

Refer to the exhibit.

Which additional configuration action must be taken to protect against Directory Harvest Attacks?

Options:

A.  

When LDAP Queries are configured, Directory Harvest Attack Prevention is enabled by default.

B.  

In the LDAP Server profile, configure Directory Harvest Attack Prevention

C.  

In the mail flow policy, configure Directory Harvest Attack Prevention.

D.  

In the Listener Settings, modify the LDAP Queries configuration to use the Work Queue

Discussion 0
Questions 21

Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)

Options:

A.  

accept

B.  

relay

C.  

delay

D.  

route

E.  

reject

Discussion 0
Questions 22

What are two primary components of content filters? (Choose two.)

Options:

A.  

conditions

B.  

subject

C.  

content

D.  

actions

E.  

policies

Discussion 0
Questions 23

A network engineer must tighten up the SPAM control policy of an organization due to a recent SPAM attack. In which scenario does enabling regional scanning improve security for this organization?

Options:

A.  

when most of the received spam comes from a specific country

B.  

when most of the received spam originates outside of the U.S.

C.  

when most of the received email originates outside of the U.S.

D.  

when most of the received email originates from a specific region

Discussion 0
Questions 24

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

Options:

A.  

message-ID

B.  

sender

C.  

URL reputation

D.  

from

E.  

mail-from

Discussion 0
Questions 25

Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?

Options:

A.  

Basic Authentication

B.  

No Authentication

C.  

Microsoft 365 Authentication

D.  

Cisco Security Cloud Sign On

Discussion 0
Questions 26

A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?

Options:

A.  

Non-Viral threat detection requires Antivirus or AMP enablement to properly function

B.  

The Outbreak Filters option Graymail Header must be enabled

C.  

Non-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function.

D.  

The Outbreak Filters option URL Rewriting must be enabled.

Discussion 0
Questions 27

Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?

Options:

A.  

DER certificate and matching public key from a CA

B.  

self-signed certificate in PKCS#7 format

C.  

X. 509 certificate and matching private key from a CA

D.  

self-signed certificate in PKCS#12 format

Discussion 0
Questions 28

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

Options:

A.  

DHAP

B.  

SBRS

C.  

LDAP

D.  

SMTP

Discussion 0
Questions 29

An Encryption Profile has been set up on the Cisco ESA.

Drag and drop the steps from the left for creating an outgoing content filter to encrypt emails that contains the subject "Secure:" into the correct order on the right.

Options:

Discussion 0
Questions 30

Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?

Options:

A.  

Add an additional mapping for attachment type for zip files.

B.  

Enable assume match pattern if the email was not scanned for any reason.

C.  

Increase the maximum recursion depth from 5 to a larger value.

D.  

Increase the maximum attachment size to scan to a larger value.

Discussion 0
Questions 31

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

Options:

A.  

redirect

B.  

return

C.  

drop

D.  

delay

E.  

abandon

Discussion 0
Questions 32

An engineer is configuring a Cisco ESA for the first time and needs to ensure that any email traffic coming from the internal SMTP servers is relayed out through the Cisco ESA and is tied to the Outgoing Mail Policies.

Which Mail Flow Policy setting should be modified to accomplish this goal?

Options:

A.  

Exception List

B.  

Connection Behavior

C.  

Bounce Detection Signing

D.  

Reverse Connection Verification

Discussion 0
Questions 33

What are two phases of the Cisco ESA email pipeline? (Choose two.)

Options:

A.  

reject

B.  

workqueue

C.  

action

D.  

delivery

E.  

quarantine

Discussion 0
Questions 34

Drag and drop authentication options for End-User Quarantine Access from the left onto the corresponding configuration steps on the right.

Options:

Discussion 0
Questions 35

An engineer must provide differentiated email filtering to executives within the organization Which two actions must be taken to accomplish this task? (Choose two)

Options:

A.  

Define an LDAP group query to specify users to whom the mail policy rules apply.

B.  

Create content filters for actions to take on messages that contain specific data

C.  

Upload a csv file containing the email addresses for the users for whom you want to create mail policies.

D.  

Enable the content-scanning features you want to use with mail policies

E.  

Define the default mail policies for incoming or outgoing messages

Discussion 0
Questions 36

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

Options:

A.  

83

B.  

82

C.  

443

D.  

80

Discussion 0
Questions 37

A Cisco Secure Email Gateway administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?

Options:

A.  

Accept

B.  

Delay

C.  

Relay

D.  

Reject

Discussion 0
Questions 38

An organization wants to prevent proprietary patent documents from being shared externally via email. The network administrator reviewed the DLP policies on the Cisco Secure Email Gateway and could not find an existing policy with the appropriate matching patterns. Which type of DLP policy template must be used to create a policy that meets this requirement?

Options:

A.  

privacy protection

B.  

custom policy

C.  

regulatory compliance

D.  

acceptable use

Discussion 0
Questions 39

What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?

Options:

A.  

provisioned email encryption profile

B.  

message encryption from a content filter that select "Message Encryption" over TLS

C.  

message encryption from the mail flow policies with "CRES" selected

D.  

content filter to forward the email to the Cisco Registered Envelope server

Discussion 0
Questions 40

Which two are configured in the DMARC verification profile? (Choose two.)

Options:

A.  

name of the verification profile

B.  

minimum number of signatures to verify

C.  

ESA listeners to use the verification profile

D.  

message action into an incoming or outgoing content filter

E.  

message action to take when the policy is reject/quarantine

Discussion 0
Questions 41

What is the default behavior of any listener for TLS communication?

Options:

A.  

preferred-verify

B.  

off

C.  

preferred

D.  

required

Discussion 0
Questions 42

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

Options:

A.  

SenderBase Reputation Filtering

B.  

Connection Reputation Filtering

C.  

Talos Reputation Filtering

D.  

SpamCop Reputation Filtering

Discussion 0
Questions 43

An administrator must ensure that emails sent from cisco_123@externally.com are routed through an alternate virtual gateway. Drag and drop the snippet from the bottom onto the blank in the graphic to finish the message filter syntax. Not all snippets are used.

Options:

Discussion 0
Questions 44

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.  

Set up the interface group with the flag.

B.  

Issue the altsrchost command.

C.  

Map the envelope sender address to the host.

D.  

Apply a filter on the message.

Discussion 0