Labour Day - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

300-720 Questions and Answers

Question # 6

A Cisco Secure Email Gateway administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?

A.

Accept

B.

Delay

C.

Relay

D.

Reject

Full Access
Question # 7

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Full Access
Question # 8

The company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data Users must be able to flag the messages that require encryption versus a Cisco Secure Email Gateway appliance scanning all messages and automatically encrypting via detection Which action enables this capability?

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

Full Access
Question # 9

A Cisco Secure Email Gateway appliance is processing many messages that are sent to invalid recipients verification. Which two steps are required to accomplish this task? (Choose two.)

A.

Enable external LDAP authentication

B.

Configure the LDAP query on a listener

C.

Configure LDAP server profiles

D.

Enable LDAP authentication on a listener

E.

Configure incoming mail policy to query LDAP server

Full Access
Question # 10

Which action do Outbreak Filters take to stop small-scale and nonviral attacks, such as phishing scams and malware distribution sites?

A.

Rewrite URLs to redirect traffic to potentially harmful websites through a web security proxy

B.

Block all emails from email domains associated with potentially harmful websites.

C.

Strip all attachments from email domains associated with potentially harmful websites.

D.

Quarantine messages that contain links to potentially harmful websites until the site is taken offline

Full Access
Question # 11

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

Full Access
Question # 12

A security administrator deployed a Cisco Secure Email Gateway appliance with a mail policy configured to store suspected spam for review. The appliance is the DMZ and only the standard HTTP/HTTPS ports are allowed by the firewall. An administrator wants to ensure that users can view any suspected spam that was blocked. Which action must be taken to meet this requirement?

A.

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

B.

Enable the Spam Quarantine and leave the default settings unchanged.

C.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

D.

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

Full Access
Question # 13

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

A.

message-ID

B.

sender

C.

URL reputation

D.

from

E.

mail-from

Full Access
Question # 14

An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?

A.

Configure the outbound firewall rule to permit traffic on port 8081

B.

Enable the Use HTTP option under Advanced Settings for File Reputation.

C.

Enable the Use SSL option under Advanced Settings for File Reputation.

D.

Configure the outbound firewall rule to permit traffic on port 3237

E.

TP/HTTPS ports outbound and notices that the AMP file reputation

Full Access
Question # 15

Which action on the Cisco ESA provides direct access to view the safelist/blocklist?

A.

Show the SLBL cache on the CLI.

B.

Monitor Incoming/Outgoing Listener.

C.

Export the SLBL to a .csv file.

D.

Debug the mail flow policy.

Full Access
Question # 16

An administrator notices that incoming emails with certain attachments do not get delivered to all recipients when the emails have multiple recipients in different domains like cisco.com and test.com. The same emails when sent only to recipients in cisco.com are delivered properly. How must the Cisco Secure Email Gateway be configured to avoid this behavior?

A.

Modify mail policies for cisco.com to ensure that emails are not dropped.

B.

Modify mail policies so email recipients do not match multiple policies.

C.

Modify DLP configuration to ensure that all attachments are permitted for test.com.

D.

Modify DLP configuration to exempt DLP scanning for messages sent to test.com domain

Full Access
Question # 17

Which setting affects the aggressiveness of spam detection?

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Full Access
Question # 18

Which two action types are performed by Cisco ESA message filters? (Choose two.)

A.

non-final actions

B.

filter actions

C.

discard actions

D.

final actions

E.

quarantine actions

Full Access
Question # 19

When the spam quarantine is configured on the Cisco Secure Email Gateway, which type of query is used to validate non administrative user access to the end-user quarantine via LDAP?

A.

spam quarantine end-user authentication

B.

spam quarantine alias consolidation

C.

spam quarantine external authorization

D.

local mailbox (IMAP/POP) authentication

Full Access
Question # 20

A recent engine update was pulled down for graymail and has caused the service to start crashing. It is critical to fix this as quickly as possible.

What must be done to address this issue?

A.

Roll back to a previous version of the engine from the Services Overview page.

B.

Roll back to a previous version of the engine from the System Health page.

C.

Download another update from the IMS and Graymail page.

D.

Download another update from the Service Updates page.

Full Access
Question # 21

Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)

A.

accept

B.

relay

C.

delay

D.

route

E.

reject

Full Access
Question # 22

A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?

A.

Non-Viral threat detection requires Antivirus or AMP enablement to properly function

B.

The Outbreak Filters option Graymail Header must be enabled

C.

Non-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function.

D.

The Outbreak Filters option URL Rewriting must be enabled.

Full Access
Question # 23

An administrator must ensure that emails sent from cisco_123@externally.com are routed through an alternate virtual gateway. Drag and drop the snippet from the bottom onto the blank in the graphic to finish the message filter syntax. Not all snippets are used.

Full Access
Question # 24

Which two features are applied to either incoming or outgoing mail policies? (Choose two.)

A.

Indication of Compromise

B.

application filtering

C.

outbreak filters

D.

sender reputation filtering

E.

antivirus

Full Access
Question # 25

Which two steps configure Forged Email Detection? (Choose two.)

A.

Configure a content dictionary with executive email addresses.

B.

Configure a filter to use the Forged Email Detection rule and dictionary.

C.

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.

Enable Forged Email Detection on the Security Services page.

E.

Configure a content dictionary with friendly names.

Full Access
Question # 26

Which attack is mitigated by using Bounce Verification?

A.

spoof

B.

denial of service

C.

eavesdropping

D.

smurf

Full Access
Question # 27

What is a benefit of implementing URL filtering on the Cisco ESA?

A.

removes threats from malicious URLs

B.

blacklists spam

C.

provides URL reputation protection

D.

enhances reputation against malicious URLs

Full Access
Question # 28

An administrator has created a content filter to quarantine all messages that result in an SPF hardfail to review the messages and determine whether a trusted partner has accidentally misconfigured the DNS settings. The administrator sets the policy quarantine to release the messages after 24 hours, allowing time to review while not interrupting business.

Which additional option should be used to help the end users be aware of the elevated risk of interacting with these messages?

A.

Notify Recipient

B.

Strip Attachments

C.

Notify Sender

D.

Modify Subject

Full Access
Question # 29

What are organizations trying to address when implementing a SPAM quarantine?

A.

true positives

B.

false negatives

C.

false positives

D.

true negatives

Full Access
Question # 30

How does the graymail safe unsubscribe feature function?

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Full Access
Question # 31

Refer to the exhibit.

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

A.

skip-filters

B.

log-entry

C.

spf-status

D.

quarantine

Full Access
Question # 32

Refer to the exhibit.

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

A.

skip-filters

B.

log-entry

C.

spf-status

D.

quarantine

Full Access
Question # 33

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

A.

default

B.

system

C.

user

D.

custom

E.

demo

Full Access
Question # 34

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

A.

83

B.

82

C.

443

D.

80

Full Access
Question # 35

Drag and drop the Cisco ESA reactions to a possible DLP from the left onto the correct action types on the right.

Full Access
Question # 36

Refer to the exhibit.

For improved security, an administrator wants to warn users about opening any links or attachments within an email How must the administrator configure an HTML-coded message at the top of an email body to create this warning?

A.

Create a text resource type of Disclaimer Template paste the HTML code into the text box. then use this text resource inside a content filter

B.

Create a text resource type of Disclaimer Template change to code view to paste the HTML code into the text box, then use this text resource inside a content filter

C.

Create a text resource type of Notification Template, paste the HTML code into the text box, then use this text resource inside a content filter.

D.

Create a text resource type of Notification Template, change to code view to paste the HTML code into the text box. then use this text resource inside a content filter.

Full Access
Question # 37

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?

A.

Enable the DKIM service checker

B.

Export the DNS TXT record to provide to the DNS registrar

C.

Import the DNS record of the service provider into the Cisco Secure Email Gateway.

D.

Configure the Trusted Sender Group message authenticity policy.

Full Access
Question # 38

An administrator is trying to enable centralized PVO but receives the error, "Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters / DLP actions available at a level different from the cluster level."

What is the cause of this error?

A.

Content filters are configured at the machine-level on esa1.

B.

DLP is configured at the cluster-level on esa2.

C.

DLP is configured at the domain-level on esa1.

D.

DLP is not configured on host1.

Full Access
Question # 39

Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?

A.

traffic between the Cisco Secure Email Gateway and the LDAP server

B.

emails being delivered from the Cisco Secure Email Gateway

C.

HTTPS traffic when connecting to the web user interface of the Cisco Secure Email Gateway

D.

emails being received by the Cisco Secure Email Gateway

Full Access
Question # 40

What are two primary components of content filters? (Choose two.)

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Full Access
Question # 41

An organization wants to designate help desk personnel to assist with tickets that request the release of messages from the spam quarantine because company policy does not permit direct end-user access to the quarantine. Which two roles must be used to allow help desk personnel to release messages while restricting their access to make configuration changes in the Cisco Secure Email Gateway? (Choose two.)

A.

Administrator

B.

Help Desk User

C.

Read-Only Operator

D.

Technician

E.

Quarantine Administrator

Full Access
Question # 42

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

Full Access
Question # 43

Which two configurations are used on multiple LDAP servers to connect with Cisco ESA? (Choose two.)

A.

load balancing

B.

SLA monitor

C.

active-standby

D.

failover

E.

active-active

Full Access
Question # 44

Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?

A.

traffic between the Cisco Secure Email Gateway and the LDAP server

B.

emails being delivered from the Cisco Secure Email Gateway

C.

HTTPS traffic when connecting to the web user interface of the Cisco Secure Email Gateway

D.

emails being received by the Cisco Secure Email Gateway

Full Access