Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

300-720 Sample Questions Answers

Questions 4

An administrator is trying to enable centralized PVO but receives the error, "Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters / DLP actions available at a level different from the cluster level."

What is the cause of this error?

Options:

A.

Content filters are configured at the machine-level on esa1.

B.

DLP is configured at the cluster-level on esa2.

C.

DLP is configured at the domain-level on esa1.

D.

DLP is not configured on host1.

Buy Now
Questions 5

A trusted partner of an organization recently experienced a new campaign that was leveraging JavaScript attachments to trick users into executing malware. As a result, they created a local policy to deny messages with JavaScript attachments. Which action should the administrator of the organization take to ensure encrypted communications are delivered to the intended partner recipient?

Options:

A.

Insert the X-PostX-Use-Script' header with a value of false to the encrypted messages

B.

Select JavaScript-free' option within the Cisco Secure Email Encryption Service Add-in

C.

Create an outgoing content filter and add the Encrypt and Deliver Nov/ action with Use-Script option deselected

D.

Create a new encryption profile and deselect the 'Use-Script' envelope settings option.

Buy Now
Questions 6

An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?

Options:

A.

Configure the outbound firewall rule to permit traffic on port 8081

B.

Enable the Use HTTP option under Advanced Settings for File Reputation.

C.

Enable the Use SSL option under Advanced Settings for File Reputation.

D.

Configure the outbound firewall rule to permit traffic on port 3237

E.

TP/HTTPS ports outbound and notices that the AMP file reputation

Buy Now
Questions 7

What is the default behavior of any listener for TLS communication?

Options:

A.

preferred-verify

B.

off

C.

preferred

D.

required

Buy Now
Questions 8

An engineer is tasked with creating a content filter to catch attachments, including credit card numbers, and hold them for review until further action is taken. Which component on a Cisco Secure Email Gateway must be configured to meet this requirement?

Options:

A.

Spam Quarantine

B.

Policy Quarantine

C.

Outbreak Filter

D.

Content Filter

Buy Now
Questions 9

A company has deployed a new mandate that requires all emails sent externally from the Sales Department to be scanned by DLP for PCI-DSS compliance. A new DLP policy has been created on the Cisco ESA and needs to be assigned to a mail policy named ‘Sales’ that has yet to be created.

Which mail policy should be created to accomplish this task?

Options:

A.

Outgoing Mail Policy

B.

Preliminary Mail Policy

C.

Incoming Mail Flow Policy

D.

Outgoing Mail Flow Policy

Buy Now
Questions 10

Which SMTP extension does Cisco ESA support for email security?

Options:

A.

ETRN

B.

UTF8SMTP

C.

PIPELINING

D.

STARTTLS

Buy Now
Questions 11

A company has recently updated their security policy and now wants to drop all email messages larger than 100 MB coming from external sources. The Cisco Secure Email Gateway is LDAP integrated and all employee accounts are in the group "Employees". Which filter rule configuration provides the desired outcome?

Options:

A.

if (mail-from-group == 'Employees') and (body-size > "100M") {drop()}

B.

if (mail-from-group != 'Employees') and (body-size > 100M) {drop();}

C.

if (mail-from-group == 'Employees') and (body-size > 100M) {bounce();}

D.

if ('mail-from-group != Employees') and (body-size > 100M) {drop();}

Buy Now
Questions 12

Which component must be added to the content filter to trigger on failed SPF Verification or DKIM Authentication verdicts?

Options:

A.

status

B.

response

C.

parameter

D.

condition

Buy Now
Questions 13

An administrator notices that incoming emails with certain attachments do not get delivered to all recipients when the emails have multiple recipients in different domains like cisco.com and test.com. The same emails when sent only to recipients in cisco.com are delivered properly. How must the Cisco Secure Email Gateway be configured to avoid this behavior?

Options:

A.

Modify mail policies for cisco.com to ensure that emails are not dropped.

B.

Modify mail policies so email recipients do not match multiple policies.

C.

Modify DLP configuration to ensure that all attachments are permitted for test.com.

D.

Modify DLP configuration to exempt DLP scanning for messages sent to test.com domain

Buy Now
Questions 14

Which two components must be configured to perform DLP scanning? (Choose two.)

Options:

A.

Add a DLP policy on the Incoming Mail Policy.

B.

Add a DLP policy to the DLP Policy Manager.

C.

Enable a DLP policy on the Outgoing Mail Policy.

D.

Enable a DLP policy on the DLP Policy Customizations.

E.

Add a DLP policy to the Outgoing Content Filter.

Buy Now
Questions 15

Which two components form the graymail management solution in Cisco ESA? (Choose two.)

Options:

A.

cloud-based unsubscribe service

B.

uniform unsubscription management interface for end users

C.

secure subscribe option for end users

D.

integrated graymail scanning engine

E.

improved mail efficacy

Buy Now
Questions 16

Drag and drop the graymail descriptions from the left onto the verdict categories they belong to on the right.

Options:

Buy Now
Questions 17

A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.

What is the reason of this?

Options:

A.

The Tram* header is checked against all policies in a top-down fashion.

B.

The message header with the highest priority is checked against each policy in a top-down fashion.

C.

The To" header is checked against all policies in a top-down fashion.

D.

The message header with the highest priority is checked against the Default policy in a top-down fashion.

Buy Now
Questions 18

Which two features are applied to either incoming or outgoing mail policies? (Choose two.)

Options:

A.

Indication of Compromise

B.

application filtering

C.

outbreak filters

D.

sender reputation filtering

E.

antivirus

Buy Now
Questions 19

When the Cisco ESA is configured to perform antivirus scanning, what is the default timeout value?

Options:

A.

30 seconds

B.

90 seconds

C.

60 seconds

D.

120 seconds

Buy Now
Questions 20

Drag and drop authentication options for End-User Quarantine Access from the left onto the corresponding configuration steps on the right.

Options:

Buy Now
Questions 21

Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?

Options:

A.

DER certificate and matching public key from a CA

B.

self-signed certificate in PKCS#7 format

C.

X. 509 certificate and matching private key from a CA

D.

self-signed certificate in PKCS#12 format

Buy Now
Questions 22

What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?

Options:

A.

provisioned email encryption profile

B.

message encryption from a content filter that select "Message Encryption" over TLS

C.

message encryption from the mail flow policies with "CRES" selected

D.

content filter to forward the email to the Cisco Registered Envelope server

Buy Now
Questions 23

An administrator must ensure that emails sent from cisco_123@externally.com are routed through an alternate virtual gateway. Drag and drop the snippet from the bottom onto the blank in the graphic to finish the message filter syntax. Not all snippets are used.

Options:

Buy Now
Questions 24

What is a valid content filter action?

Options:

A.

decrypt on delivery

B.

quarantine

C.

skip antispam

D.

archive

Buy Now
Questions 25

What is the maximum message size that can be configured for encryption on the Cisco ESA?

Options:

A.

20 MB

B.

25 MB

C.

15 MB

D.

30 MB

Buy Now
Questions 26

Drag and drop the AsyncOS methods for performing DMARC verification from the left into the correct order on the right.

Options:

Buy Now
Questions 27

Which antispam feature is utilized to give end users control to allow emails that are spam to be delivered to their inbox, overriding any spam verdict and action on the Cisco ESA?

Options:

A.

end user allow list

B.

end user spam quarantine access

C.

end user passthrough list

D.

end user safelist

Buy Now
Questions 28

Refer to the exhibit.

For improved security, an administrator wants to warn users about opening any links or attachments within an email How must the administrator configure an HTML-coded message at the top of an email body to create this warning?

Options:

A.

Create a text resource type of Disclaimer Template paste the HTML code into the text box. then use this text resource inside a content filter

B.

Create a text resource type of Disclaimer Template change to code view to paste the HTML code into the text box, then use this text resource inside a content filter

C.

Create a text resource type of Notification Template, paste the HTML code into the text box, then use this text resource inside a content filter.

D.

Create a text resource type of Notification Template, change to code view to paste the HTML code into the text box. then use this text resource inside a content filter.

Buy Now
Questions 29

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Buy Now
Questions 30

A network engineer must tighten up the SPAM control policy of an organization due to a recent SPAM attack. In which scenario does enabling regional scanning improve security for this organization?

Options:

A.

when most of the received spam comes from a specific country

B.

when most of the received spam originates outside of the U.S.

C.

when most of the received email originates outside of the U.S.

D.

when most of the received email originates from a specific region

Buy Now
Questions 31

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

Options:

A.

message-ID

B.

sender

C.

URL reputation

D.

from

E.

mail-from

Buy Now
Questions 32

A Cisco ESA administrator was notified that a user was not receiving emails from a specific domain. After reviewing the mail logs, the sender had a negative sender-based reputation score.

What should the administrator do to allow inbound email from that specific domain?

Options:

A.

Create a new inbound mail policy with a message filter that overrides Talos.

B.

Ask the user to add the sender to the email application's allow list.

C.

Modify the firewall to allow emails from the domain.

D.

Add the domain into the allow list.

Buy Now
Questions 33

Which content filter condition checks to see if the "From: header" in the message is similar to any of the users in the content dictionary?

Options:

A.

Forged Email Detection

B.

SPF Verification

C.

Subject Header

D.

Duplicate Boundaries Verification

Buy Now
Questions 34

Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?

Options:

A.

Basic Authentication

B.

No Authentication

C.

Microsoft 365 Authentication

D.

Cisco Security Cloud Sign On

Buy Now
Questions 35

Which two query types are available when an LDAP profile is configured? (Choose two.)

Options:

A.

proxy consolidation

B.

user

C.

recursive

D.

group

E.

routing

Buy Now
Questions 36

What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

Options:

A.

8025

B.

6443

C.

6025

D.

8443

Buy Now
Questions 37

Which global setting is configured under Cisco ESA Scan Behavior?

Options:

A.

minimum attachment size to scan

B.

attachment scanning timeout

C.

actions for unscannable messages due to attachment type

D.

minimum depth of attachment recursion to scan

Buy Now
Questions 38

Which two Cisco ESA features are used to control email delivery based on the sender? (Choose two.)

Options:

A.

incoming mail policies

B.

spam quarantine

C.

outbreak filter

D.

safelists

E.

blocklists

Buy Now
Questions 39

To comply with a recent audit, an engineer must configure anti-virus message handling options on the incoming mail policies to attach warnings to the subject of an email.

What should be configured to meet this requirement for known viral emails?

Options:

A.

Virus Infected Messages

B Unscannable Messages

B.

Encrypted Messages

C.

Positively Identified Messages

Buy Now
Questions 40

A list of company executives is routinely being spoofed, which puts the company at risk of malicious email attacks An administrator must ensure that executive messages are originating from legitimate sending addresses Which two steps must be taken to accomplish this task? (Choose two.)

Options:

A.

Create an incoming content filter with SPF detection.

B.

Enable the Forged Email Detection feature under Security Settings.

C.

Enable DMARC feature under Mail Policies.

D.

Create an incoming content filter with the Forged Email Detection condition

E.

Create a content dictionary including a list of the names that are being spoofed.

Buy Now
Questions 41

When DKIM signing is configured, which DNS record must be updated to load the DKIM public signing key?

Options:

A.

AAAA record

B.

PTR record

C.

TXT record

D.

MX record

Buy Now
Questions 42

Which action must be taken before a custom quarantine that is being used can be deleted?

Options:

A.

Delete the quarantine that is assigned to a filter.

B.

Delete the quarantine that is not assigned to a filter.

C.

Delete only the unused quarantine.

D.

Remove the quarantine from the message action of a filter.

Buy Now
Questions 43

An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Cisco ESA should be used to achieve this?

Options:

A.

incoming mail policies

B.

safelist

C.

blocklist

D.

S/MIME Sending Profile

Buy Now
Questions 44

Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?

Options:

A.

A policy quarantine is missing.

B.

More than one email pipeline is defined.

C.

The "modify the message subject" is already set.

D.

The "add custom header" action is performed first.

Buy Now
Exam Code: 300-720
Exam Name: Securing Email with Cisco Email Security Appliance (300-720 SESA)
Last Update: Nov 21, 2024
Questions: 147
$68  $169.99
$52  $129.99
$44  $109.99
buy now 300-720