Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) Exam Practice Test

Page: 1 / 15
Total 147 questions

Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Question 1

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

Options:

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Question 2

An engineer is configuring an SMTP authentication profile on a Cisco ESA which requires certificate verification.

Which section must be configured to accomplish this goal?

Options:

A.

Mail Flow Policies

B.

Sending Profiles

C.

Outgoing Mail Policies

D.

Verification Profiles

Question 3

An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Cisco ESA should be used to achieve this?

Options:

A.

incoming mail policies

B.

safelist

C.

blocklist

D.

S/MIME Sending Profile

Question 4

Which two features are applied to either incoming or outgoing mail policies? (Choose two.)

Options:

A.

Indication of Compromise

B.

application filtering

C.

outbreak filters

D.

sender reputation filtering

E.

antivirus

Question 5

Which suboption must be selected when LDAP is configured for Spam Quarantine End-User Authentication?

Options:

A.

Designate as the active query

B.

Update Frequency

C.

Server Priority

D.

Entity ID

Question 6

An administrator notices that incoming emails with certain attachments do not get delivered to all recipients when the emails have multiple recipients in different domains like cisco.com and test.com. The same emails when sent only to recipients in cisco.com are delivered properly. How must the Cisco Secure Email Gateway be configured to avoid this behavior?

Options:

A.

Modify mail policies for cisco.com to ensure that emails are not dropped.

B.

Modify mail policies so email recipients do not match multiple policies.

C.

Modify DLP configuration to ensure that all attachments are permitted for test.com.

D.

Modify DLP configuration to exempt DLP scanning for messages sent to test.com domain

Question 7

Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?

Options:

A.

DER certificate and matching public key from a CA

B.

self-signed certificate in PKCS#7 format

C.

X. 509 certificate and matching private key from a CA

D.

self-signed certificate in PKCS#12 format

Question 8

An organization wants to use DMARC to improve its brand reputation by leveraging DNS records.

Which two email authentication mechanisms are utilized during this process? (Choose two.)

Options:

A.

SPF

B.

DSTP

C.

DKIM

D.

TLS

E.

PKI

Question 9

How does the graymail safe unsubscribe feature function?

Options:

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Question 10

Which SMTP extension does Cisco ESA support for email security?

Options:

A.

ETRN

B.

UTF8SMTP

C.

PIPELINING

D.

STARTTLS

Question 11

A Cisco Secure Email Gateway administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?

Options:

A.

Accept

B.

Delay

C.

Relay

D.

Reject

Question 12

Spreadsheets containing credit card numbers are being allowed to bypass the Cisco ESA.

Which outgoing mail policy feature should be configured to catch this content before it leaves the network?

Options:

A.

file reputation filtering

B.

outbreak filtering

C.

data loss prevention

D.

file analysis

Question 13

A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?

Options:

A.

Non-Viral threat detection requires Antivirus or AMP enablement to properly function

B.

The Outbreak Filters option Graymail Header must be enabled

C.

Non-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function.

D.

The Outbreak Filters option URL Rewriting must be enabled.

Question 14

An administrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.

How is this accomplished?

Options:

A.

Disable the VOF feature before sending SPAM to the external quarantine.

B.

Configure a mail policy to determine whether the message is sent to the local or external quarantine.

C.

Disable the local quarantine before sending SPAM to the external quarantine.

D.

Configure a user policy to determine whether the message is sent to the local or external quarantine.

Question 15

What are the two different phases in the process of Cisco Secure Email Gateway performing S/MIME encryption? (Choose two.)

Options:

A.

Attach the encrypted public key to the message

B.

Encrypt the message body using the session key

C.

Send the encrypted message to the sender

D.

Attach the encrypted symmetric key to the message

E.

Create a pseudo-random session key.

Question 16

What is the maximum message size that can be configured for encryption on the Cisco ESA?

Options:

A.

20 MB

B.

25 MB

C.

15 MB

D.

30 MB

Question 17

An organization wants to designate help desk personnel to assist with tickets that request the release of messages from the spam quarantine because company policy does not permit direct end-user access to the quarantine. Which two roles must be used to allow help desk personnel to release messages while restricting their access to make configuration changes in the Cisco Secure Email Gateway? (Choose two.)

Options:

A.

Administrator

B.

Help Desk User

C.

Read-Only Operator

D.

Technician

E.

Quarantine Administrator

Question 18

When URL logging is configured on a Cisco ESA, which feature must be enabled first?

Options:

A.

antivirus

B.

antispam

C.

virus outbreak filter

D.

senderbase reputation filter

Question 19

Refer to the exhibit.

Question # 19

Which additional configuration action must be taken to protect against Directory Harvest Attacks?

Options:

A.

When LDAP Queries are configured, Directory Harvest Attack Prevention is enabled by default.

B.

In the LDAP Server profile, configure Directory Harvest Attack Prevention

C.

In the mail flow policy, configure Directory Harvest Attack Prevention.

D.

In the Listener Settings, modify the LDAP Queries configuration to use the Work Queue

Question 20

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

Options:

A.

message-ID

B.

sender

C.

URL reputation

D.

from

E.

mail-from

Question 21

Which component must be added to the content filter to trigger on failed SPF Verification or DKIM Authentication verdicts?

Options:

A.

status

B.

response

C.

parameter

D.

condition

Question 22

Which two factors must be considered when message filter processing is configured? (Choose two.)

Options:

A.

message-filter order

B.

lateral processing

C.

structure of the combined packet

D.

mail policies

E.

MIME structure of the message

Question 23

An administrator has created a content filter to quarantine all messages that result in an SPF hardfail to review the messages and determine whether a trusted partner has accidentally misconfigured the DNS settings. The administrator sets the policy quarantine to release the messages after 24 hours, allowing time to review while not interrupting business.

Which additional option should be used to help the end users be aware of the elevated risk of interacting with these messages?

Options:

A.

Notify Recipient

B.

Strip Attachments

C.

Notify Sender

D.

Modify Subject

Question 24

Which type of query must be configured when setting up the Spam Quarantine while merging notifications?

Options:

A.

Spam Quarantine Alias Routing Query

B.

Spam Quarantine Alias Consolidation Query

C.

Spam Quarantine Alias Authentication Query

D.

Spam Quarantine Alias Masquerading Query

Question 25

Drag and drop the Cisco ESA reactions to a possible DLP from the left onto the correct action types on the right.

Question # 25

Options:

Question 26

Which two query types are available when an LDAP profile is configured? (Choose two.)

Options:

A.

proxy consolidation

B.

user

C.

recursive

D.

group

E.

routing

Question 27

An administrator manipulated the subnet mask but was still unable to access the user interface. How must the administrator access the Cisco Secure Email Gateway appliance to perform the initial configuration?

Options:

A.

Use the serial or console port

B.

Use the management port

C.

Use the data 2 port

D.

Use the data 1 port

Question 28

An analyst creates a new content dictionary to use with Forged Email Detection.

Which entry will be added into the dictionary?

Options:

A.

mycompany.com

B.

Alpha Beta

C.

^Alpha\ Beta$

D.

Alpha.Beta@mycompany.com

Question 29

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

Options:

A.

SenderBase Reputation Filtering

B.

Connection Reputation Filtering

C.

Talos Reputation Filtering

D.

SpamCop Reputation Filtering

Question 30

Refer to the exhibit.

Question # 30

For improved security, an administrator wants to warn users about opening any links or attachments within an email How must the administrator configure an HTML-coded message at the top of an email body to create this warning?

Options:

A.

Create a text resource type of Disclaimer Template paste the HTML code into the text box. then use this text resource inside a content filter

B.

Create a text resource type of Disclaimer Template change to code view to paste the HTML code into the text box, then use this text resource inside a content filter

C.

Create a text resource type of Notification Template, paste the HTML code into the text box, then use this text resource inside a content filter.

D.

Create a text resource type of Notification Template, change to code view to paste the HTML code into the text box. then use this text resource inside a content filter.

Question 31

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?

Options:

A.

Enable the DKIM service checker

B.

Export the DNS TXT record to provide to the DNS registrar

C.

Import the DNS record of the service provider into the Cisco Secure Email Gateway.

D.

Configure the Trusted Sender Group message authenticity policy.

Question 32

A trusted partner of an organization recently experienced a new campaign that was leveraging JavaScript attachments to trick users into executing malware. As a result, they created a local policy to deny messages with JavaScript attachments. Which action should the administrator of the organization take to ensure encrypted communications are delivered to the intended partner recipient?

Options:

A.

Insert the X-PostX-Use-Script' header with a value of false to the encrypted messages

B.

Select JavaScript-free' option within the Cisco Secure Email Encryption Service Add-in

C.

Create an outgoing content filter and add the Encrypt and Deliver Nov/ action with Use-Script option deselected

D.

Create a new encryption profile and deselect the 'Use-Script' envelope settings option.

Question 33

A company has deployed a new mandate that requires all emails sent externally from the Sales Department to be scanned by DLP for PCI-DSS compliance. A new DLP policy has been created on the Cisco ESA and needs to be assigned to a mail policy named ‘Sales’ that has yet to be created.

Which mail policy should be created to accomplish this task?

Options:

A.

Outgoing Mail Policy

B.

Preliminary Mail Policy

C.

Incoming Mail Flow Policy

D.

Outgoing Mail Flow Policy

Question 34

A Cisco Secure Email Gateway appliance is processing many messages that are sent to invalid recipients verification. Which two steps are required to accomplish this task? (Choose two.)

Options:

A.

Enable external LDAP authentication

B.

Configure the LDAP query on a listener

C.

Configure LDAP server profiles

D.

Enable LDAP authentication on a listener

E.

Configure incoming mail policy to query LDAP server

Question 35

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

Options:

A.

83

B.

82

C.

443

D.

80

Question 36

A Cisco ESA administrator was notified that a user was not receiving emails from a specific domain. After reviewing the mail logs, the sender had a negative sender-based reputation score.

What should the administrator do to allow inbound email from that specific domain?

Options:

A.

Create a new inbound mail policy with a message filter that overrides Talos.

B.

Ask the user to add the sender to the email application's allow list.

C.

Modify the firewall to allow emails from the domain.

D.

Add the domain into the allow list.

Question 37

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

Options:

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

Question 38

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: must be entered. What must be added to the dictionary to accomplish this goal?

Options:

A.

example.com

B.

Example CEO

C.

ceo

D.

ceo@example com

Question 39

Which two components must be configured to perform DLP scanning? (Choose two.)

Options:

A.

Add a DLP policy on the Incoming Mail Policy.

B.

Add a DLP policy to the DLP Policy Manager.

C.

Enable a DLP policy on the Outgoing Mail Policy.

D.

Enable a DLP policy on the DLP Policy Customizations.

E.

Add a DLP policy to the Outgoing Content Filter.

Question 40

Which feature must be activated on a Cisco Secure Email Gateway to combat backscatter?

Options:

A.

Graymail Detection

B.

Bounce Verification

C.

Forged Email Detection

D.

Bounce Profile

Question 41

Question # 41

Question # 41

Refer to the exhibits. What must be done to enforce end user authentication before accessing quarantine?

Options:

A.

Enable SPAM notification and use LDAP for authentication.

B.

Enable SPAM Quarantine Notification and add the %quarantine_url% variable.

C.

Change the end user quarantine access from None authentication to SAAS.

D.

Change the end user quarantine access setting from None authentication to Mailbox.

Question 42

Drag and drop authentication options for End-User Quarantine Access from the left onto the corresponding configuration steps on the right.

Question # 42

Options:

Question 43

Which of the following two statements are correct about the large file attachments (greater than 25MB) feature in Cisco Secure Email Encryption Service? (Choose two.)

Options:

A.

Large file attachments can only be sent using the websafe portal

B.

This feature allows users to send up to 50MB of attachments in a secure email.

C.

Large file attachments will be sent as a securedoc attachment

D.

Large file attachments can only be sent using the Cisco Secure Email Add-In.

E.

This feature can only be enabled if the Read from Message feature is enabled

Question 44

Which content filter condition checks to see if the "From: header" in the message is similar to any of the users in the content dictionary?

Options:

A.

Forged Email Detection

B.

SPF Verification

C.

Subject Header

D.

Duplicate Boundaries Verification

Page: 1 / 15
Total 147 questions