Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-720 Questions and Answers

Question # 6

Which two Cisco ESA features are used to control email delivery based on the sender? (Choose two.)

A.

incoming mail policies

B.

spam quarantine

C.

outbreak filter

D.

safelists

E.

blocklists

Full Access
Question # 7

An engineer must configure Directory Harvest Attack Prevention for SMTP in Cisco Secure Email Gateway. This error message must be sent when the listener receives more than 50 invalid

recipients per hour.

•500 - Too many requests

•Max. Invalid Recipients Per Hour was set to 50 already.

Which two actions must be taken next to set maximum invalid recipients per hour to meet the requirement? (Choose two.)

A.

Create Max. Recipients Per Hour Code to 500.

B.

Apply Max. Recipients Per Hour Text to 500 - Too many requests.

C.

Configure Max. Recipients Per Hour Code to 500.

D.

Set Max. Recipients Per Hour Text to Too many requests.

E.

Implement Max. Recipients Per Hour Text to 500 - Too many requests.

Full Access
Question # 8

Refer to the exhibit. How should this configuration be modified to stop delivering Zero Day malware attacks?

A.

Change Unscannable Action from Deliver As Is to Quarantine.

B.

Change File Analysis Pending action from Deliver As Is to Quarantine.

C.

Configure mailbox auto-remediation.

D.

Apply Prepend on Modify Message Subject under Malware Attachments.

Full Access
Question # 9

What is a benefit of graymail services?

A.

provides the option to unsubscribe from unwanted marketing emails

B.

removes spam based on the sender email address

C.

provides a safe method to subscribe to social network emails

D.

offers cloud and on-site unsubscription service

Full Access
Question # 10

Refer to the exhibit.

Which configuration allows the Cisco Secure Email Gateway to scan for executables inside the archive file and apply the action as per the content filter?

A.

Configure the recursion depth to a higher value.

B.

Modify the content filter to look for attachment filetype of compressed.

C.

Configure the maximum attachment size to a higher value.

D.

Modify the content filter to look for exe filename instead of executable filetype.

Full Access
Question # 11

What are two phases of the Cisco ESA email pipeline? (Choose two.)

A.

reject

B.

workqueue

C.

action

D.

delivery

E.

quarantine

Full Access
Question # 12

An engineer must configure incoming message verification using DM ARC in Cisco Secure Email Gateway. Emails from VP@cisco.com must skip the verification Drag and drop the actions from the left into the sequence on the right to meet the requirement.

Full Access
Question # 13

Users have been complaining of a higher volume of emails containing profanity. The network administrator will need to leverage dictionaries and create specific conditions to reduce the number of inappropriate emails.

Which two filters should be configured to a ddress this? (Choose two.)

A.

message

B.

spam

C.

VOF

D.

sender group

E.

content

Full Access
Question # 14

An engineer is configuring a Cisco Secure Email Gateway and needs to reject email messages to a recipient with email address user0516585210@acme.com . Which list contains the allowed recipient addresses?

A.

BAT

B.

HAT

C.

SAT

D.

RAT

Full Access
Question # 15

An engineer wants to ensure that emails received by company users that contain URLs do not make them susceptible to data loss from accessing malicious or undesired external content sources Which two features must be configured on Cisco Secure Email Gateway to meet this requirement1? (Choose two.)

A.

antispam scanning

B.

data loss prevention

C.

graymail detection

D.

URL filtering

E.

antivirus scanning

Full Access
Question # 16

An administrator notices that incoming emails with certain attachments do not get delivered to all recipients when the emails have multiple recipients in different domains like cisco.com and test.com. The same emails when sent only to recipients in cisco.com are delivered properly. How must the Cisco Secure Email Gateway be configured to avoid this behavior?

A.

Modify mail policies for cisco.com to ensure that emails are not dropped.

B.

Modify mail policies so email recipients do not match multiple policies.

C.

Modify DLP configuration to ensure that all attachments are permitted for test.com.

D.

Modify DLP configuration to exempt DLP scanning for messages sent to test.com domain

Full Access
Question # 17

An engineer must modify the altsrchost table on a Cisco Secure Email Gateway Messages destined for a domain named @cisco.com must be mapped to Newlnterface with an IP address of 10.10.10.1. What must be added to the table?

A.

Newlnterface @cisco.com

B.

Cisco com® 10.10.10.1

C.

@cisco.com Newlnterface

D.

cisco.com® Newlnterface

Full Access
Question # 18

What is needed to sign outbound emails using Domain Keys Identified Mail after a signing profile is created in the Cisco Secure Email Gateway?

A.

Configure in destination controls.

B.

Enable DKIM in an outbound content filter.

C.

Enable DKIM in the mail flow policy.

D.

A signing profile referencing the sender domain is sufficient.

Full Access
Question # 19

A company has deployed a new mandate that requires all emails sent externally from the Sales Department to be scanned by DLP for PCI-DSS compliance. A new DLP policy has been created on the Cisco ESA and needs to be assigned to a mail policy named ‘Sales’ that has yet to be create d.

Which mail policy should be created to accomplish this task?

A.

Outgoing Mail Policy

B.

Preliminary Mail Policy

C.

Incoming Mail Flow Policy

D.

Outgoing Mail Flow Policy

Full Access
Question # 20

An engineer must share threat reporting information from Cisco Secure Email Gateway to Cisco SecureX. Which setting must be enabled in Secure Email Gateway?

A.

SNMP

B.

Security Services Exchange

C.

Cloud Service Settings

D.

System Monitor

Full Access
Question # 21

Drag and drop the Cisco ESA reactions to a possible DLP from the left onto the correct action types on the right.

Full Access
Question # 22

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

A.

SenderBase Reputation Filtering

B.

Connection Reputation Filtering

C.

Talos Reputation Filtering

D.

SpamCop Reputation Filtering

Full Access
Question # 23

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Full Access
Question # 24

An organization wants to prevent proprietary patent documents from being shared externally via email. The network administrator reviewed the DLP policies on the Cisco Secure Email Gateway and could not find an existing policy with the appropriate matching patterns. Which type of DLP policy template must be used to create a policy that meets this requirement?

A.

privacy protection

B.

custom policy

C.

regulatory compliance

D.

acceptable use

Full Access
Question # 25

What is the default behavior of any listener for TLS communication?

A.

preferred-verify

B.

off

C.

preferred

D.

required

Full Access
Question # 26

An engineer must configure a mail policy for all incoming email that contains a Microsoft Excel attachment. All such email must be quarantined without any exception. After the incoming mail policy is created, which action must be taken next to meet the requirement?

A.

Set the quarantine threat level threshold to 1.

B.

Configure the Outgoing Content Filters settings.

C.

Set the quarantine threat level threshold to 5.

D.

Create an incoming content filter to match required attachments.

Full Access
Question # 27

Which attack is mitigated by using Bounce Verification?

A.

spoof

B.

denial of service

C.

eavesdropping

D.

smurf

Full Access
Question # 28

A Cisco Secure Email Gateway administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?

A.

Accept

B.

Delay

C.

Relay

D.

Reject

Full Access
Question # 29

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

A.

default

B.

system

C.

user

D.

custom

E.

demo

Full Access
Question # 30

Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?

A.

Basic Authentication

B.

No Authentication

C.

Microsoft 365 Authentication

D.

Cisco Security Cloud Sign On

Full Access
Question # 31

When an email is sent with bounce verification enabled, which address is rewritten by the Cisco Secure Email Gateway in the message?

A.

sender

B.

envelope recipient

C.

recipient

D.

envelope sender

Full Access
Question # 32

What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

A.

8025

B.

6443

C.

6025

D.

8443

Full Access
Question # 33

When the Cisco ESA is configured to perform antivirus scanning, what is the default timeout value?

A.

30 seconds

B.

90 seconds

C.

60 seconds

D.

120 seconds

Full Access
Question # 34

Which type of attack does Bounce Verification fight against?

A.

identity

B.

backscatter

C.

phishing

D.

spear phishing

Full Access
Question # 35

Which of the following two statements are correct about the large file attachments (greater than 25MB) feature in Cisco Secure Email Encryption Service? (Choose two.)

A.

Large file attachments can only be sent using the websafe portal

B.

This feature allows users to send up to 50MB of attachments in a secure email.

C.

Large file attachments will be sent as a securedoc attachment

D.

Large file attachments can only be sent using the Cisco Secure Email Add-In.

E.

This feature can only be enabled if the Read from Message feature is enabled

Full Access
Question # 36

An email administrator must configure DLP policies on the Cisco Secure Email Gateway. The DLP policies must be added to the default outgoing mail policy. How is this task accomplished?

A.

Create a recipient group for the DLP policies and apply it to the default outgoing mail policy.

B.

Remove DLP policies with the same severity level prior to leveraging the DLP Assessment Wizard

C.

Create a classifier to match specific content within a predefined DLP policy template

D.

Remove all existing DLP policies prior to leveraging the DLP Assessment Wizard.

Full Access
Question # 37

To comply with a recent audit, an engineer must configure anti-virus message handling options on the incoming mail policies to attach warnings to the subject of an email.

What should be configured to meet this requirement for known viral emails?

A.

Virus Infected Messages

B Unscannable Messages

B.

Encrypted Messages

C.

Positively Identified Messages

Full Access
Question # 38

Which two are configured in the DMARC verification profile? (Choose two.)

A.

name of the verification profile

B.

minimum number of signatures to verify

C.

ESA listeners to use the verification profile

D.

message action into an incoming or outgoing content filter

E.

message action to take when the policy is reject/quarantine

Full Access
Question # 39

An engineer must configure the message source when integrating Cisco Secure Email Threat Defense with Microsoft 365. The integration must allow visibility but not remediation. Drag and drop the actions from the left into sequence on the right to meet the requirement.

Full Access
Question # 40

Refer to the exhibit.

For improved security, an administrator wants to warn users about opening any links or attachments within an email How must the administrator configure an HTML-coded message at the top of an email body to create this warning?

A.

Create a text resource type of Disclaimer Template paste the HTML code into the text box. then use this text resource inside a content filter

B.

Create a text resource type of Disclaimer Template change to code view to paste the HTML code into the text box, then use this text resource inside a content filter

C.

Create a text resource type of Notification Template, paste the HTML code into the text box, then use this text resource inside a content filter.

D.

Create a text resource type of Notification Template, change to code view to paste the HTML code into the text box. then use this text resource inside a content filter.

Full Access
Question # 41

What is a capability of content filters?

A.

to review messages based on email subject

B.

to scan incoming or outgoing messages

C.

to apply rules before message filters

D.

to perform antispam scanning

Full Access
Question # 42

Which two factors must be considered when message filter processing is configured? (Choose two.)

A.

message-filter order

B.

lateral processing

C.

structure of the combined packet

D.

mail policies

E.

MIME structure of the message

Full Access
Question # 43

Which two steps configure Forged Email Detection? (Choose two.)

A.

Configure a content dictionary with executive email addresses.

B.

Configure a filter to use the Forged Email Detection rule and dictionary.

C.

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.

Enable Forged Email Detection on the Security Services page.

E.

Configure a content dictionary with friendly names.

Full Access
Question # 44

A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.

What is the reason of this?

A.

The Tram* header is checked against all policies in a top-down fashion.

B.

The message header with the highest priority is checked ag ainst each policy in a top-down fashion.

C.

The To " header is checked against all policies in a top-down fashion.

D.

The message header with the highest priority is checked against the Default policy in a top-down fashion.

Full Access
Question # 45

Which Cisco ESA security service is configured only through an outgoing mail policy?

A.

antivirus

B.

DLP

C.

Outbreak Filters

D.

AMP

Full Access
Question # 46

Spreadsheets containing credit card numbers are being allowed to bypass the Cisco ESA.

Which outgoing mail policy feature should be configured to catch this content before it leaves the network?

A.

file reputation filtering

B.

outbreak filtering

C.

data loss prevention

D.

file analysis

Full Access
Question # 47

Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)

A.

Paste in the Registration Token generated from the Smart Licensing Account

B.

Enable the Threat Response service under Network > Cloud Service Settings.

C.

Select the correct Threat Response Server based on your region.

D.

Paste in the Registration Token generated from the Security Services Exchange.

E.

Enable the Security Services Exchange service under Network > Cloud Service Settings

Full Access
Question # 48

Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?

A.

quarantine threat level

B.

antispam

C.

data loss prevention

D.

antivirus

Full Access
Question # 49

When URL logging is configured on a Cisco ESA, which feature must be enabled first?

A.

antivirus

B.

antispam

C.

virus outbreak filter

D.

senderbase reputation filter

Full Access
Question # 50

What is the default method of remotely accessing a newly deployed Cisco Secure Email Virtual Gateway when a DHCP server is not available?

A.

Manual configuration of an IP address is required through the serial port before remote access

B.

DHCP is required for the initial IP address assignment

C.

Use the IP address of 192.168 42 42 via the Management port

D.

Manual configuration of an IP address is required through the hypervisor console before remote access

Full Access
Question # 51

Drag and drop the steps to configure Cisco ESA to use SPF/SIDF verification from the left into the correct order on the right.

Full Access
Question # 52

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Full Access
Question # 53

How does the graymail safe unsubscribe feature function?

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Full Access
Question # 54

An engineer must add the user1@cisco.co m with an IP address of 10.1.1.13 to a safelist in Cisco Secure Email Gateway. Which two safelist syntaxes must be configured to meet the requirement? (Choose two.)

A.

[10.1.1.16/30]

B.

user1@ [10.1.1.13]

C.

[10.1.1.0/24]

D.

[10.1.1.13/30]

Full Access
Question # 55

Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?

A.

A policy quarantine is missing.

B.

More than one email pipeline is defined.

C.

The " modify the message subject " is already set.

D.

The " add custom header " action is performed first.

Full Access
Question # 56

Refer to the exhibit. An engineer is trying to connect to a Cisco E SA using SSH and has been unsuccessful. Upon further inspection, the engineer notices that there is a loss of connectivity to the neighboring switch.

Which connection method should be used to determine the configuration issue?

A.

Telnet

B.

HTTPS

C.

Ethernet

D.

serial

Full Access
Question # 57

Which action is allowed while managing list of certificate authorities on Cisco Secure Email Gateway?

A.

Export the list to the xml file.

B.

Remove the preinstalled list.

C.

Accept the selected certificate list.

D.

Enable the system list.

Full Access