Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) Exam Practice Test

Page: 1 / 19
Total 190 questions

Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Question 1

Which predefined DLP category must be used by a network administrator to ensure that a company employee cannot send credit card information outside the company?

Options:

A.

Company Confidential

B.

Regulatory Compliance

C.

Intellectual Property Protection

D.

Acceptable Use

Question 2

What is a benefit of implementing URL filtering on the Cisco ESA?

Options:

A.

removes threats from malicious URLs

B.

blacklists spam

C.

provides URL reputation protection

D.

enhances reputation against malicious URLs

Question 3

An admin istrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.

How is this accomplished?

Options:

A.

Disable the VOF feature before sending SPAM to the external quarantine.

B.

Configure a mail p olicy to determine whether the message is sent to the local or external quarantine.

C.

Disable the local quarantine before sending SPAM to the external quarantine.

D.

Configure a user policy to determine whether the message is sent to the local or exte rnal quarantine.

Question 4

Which two Cisco ESA features are used to control email delivery based on the sender? (Choose two.)

Options:

A.

incoming mail policies

B.

spam quarantine

C.

outbreak filter

D.

safelists

E.

blocklists

Question 5

What is the function of authenticating SMTP sessions using client certificates?

Options:

A.

Users must configure a mail client to send messages through a secure SSL connection and accept a server certificate from the appliance.

B.

If the certificate is valid, the Secure Email Gateway allows an SMTP connection from the mail client over TLS.

C.

If the Secure Email Gateway is configured to require users to provide a certificate when sending mail, no exceptions are allowed for any users.

D.

The Secure Email Gateway requests a client certificate from a user ' s mail client during connection to the appliance.

Question 6

Question # 6

Refer to the exhibit. An engineer needs to change the existing Forged Email Detection message filter so that it references a newly created dictionary named ‘Executives’.

What should be done to accomplish this task?

Options:

A.

Change " from " to " Executives " .

B.

Change " TESF to " Executives " .

C.

Change fed ' to " Executives " .

D.

Change " support " to " Executives " .

Question 7

An engineer is configuring a Cisco Secure Email Gateway and needs to reject email messages to a recipient with email address user0516585210@acme.com . Which list contains the allowed recipient addresses?

Options:

A.

BAT

B.

HAT

C.

SAT

D.

RAT

Question 8

An engineer must configure Directory Harvest Attack Prevention for SMTP in Cisco Secure Email Gateway. This error message must be sent when the listener receives more than 50 invalid

recipients per hour.

•500 - Too many requests

•Max. Invalid Recipients Per Hour was set to 50 already.

Which two actions must be taken next to set maximum invalid recipients per hour to meet the requirement? (Choose two.)

Options:

A.

Create Max. Recipients Per Hour Code to 500.

B.

Apply Max. Recipients Per Hour Text to 500 - Too many requests.

C.

Configure Max. Recipients Per Hour Code to 500.

D.

Set Max. Recipients Per Hour Text to Too many requests.

E.

Implement Max. Recipients Per Hour Text to 500 - Too many requests.

Question 9

Which two features are applied to either incoming or outgoing mail policies? (Choose two.)

Options:

A.

Indication of Compromise

B.

application filtering

C.

outbreak filters

D.

sender reputation filtering

E.

antivirus

Question 10

Which component must be added to the content filter to trigger on failed SPF Verification or DKIM Authentication verdicts?

Options:

A.

status

B.

response

C.

parameter

D.

condition

Question 11

Drag and drop the graymail descriptions from the left onto the verdict categories they belong to on the right.

Question # 11

Options:

Question 12

What is the purpose of Cisco Email Encryption on Cisco ESA?

Options:

A.

to ensure anonymity between a recipient and MTA

B.

to ensure integrity between a sender and MTA

C.

to aut henticate direct communication between a sender and Cisco ESA

D.

to ensure privacy between Cisco ESA and MTA

Question 13

A network engineer must tighten up the SPAM control policy of an organization due to a recent SPAM attack. In which scenario does enabling regional scanning improve security for this organization?

Options:

A.

when most of the received spam comes from a specific country

B.

when most of the received spam originates outside of the U.S.

C.

when most of the received email originates outside of the U.S.

D.

when most of the received email originates from a specific region

Question 14

Question # 14

Refer to the exhibit. A security engineer must create a message filter on a Cisco Secure Email Gateway to scan all incoming emails for encrypted PDF files. Which code snippet completes the message filter?

Options:

A.

attachment

B.

attachment-binary-include

C.

attachment-binary-contains

D.

attachment-binary-file

Question 15

An engineer must enable encryption on a Cisco Secure Email Gateway. The maximum size of each message must be 20 MB. Drag and drop the actions from the left into sequence on the right to meet the requirement.

Question # 15

Options:

Question 16

An engineer must modify the altsrchost table on a Cisco Secure Email Gateway Messages destined for a domain named @cisco.com must be mapped to Newlnterface with an IP address of 10.10.10.1. What must be added to the table?

Options:

A.

Newlnterface @cisco.com

B.

Cisco com® 10.10.10.1

C.

@cisco.com Newlnterface

D.

cisco.com® Newlnterface

Question 17

The CEO sent an email indicating that all emails containing a string of 123ABCDEFGHJ cannot be delivered and must be sent into quarantine for further inspection. Given the requirement, which regular expression should be used to match on that criteria?

Options:

A.

\\D{3}[A-Z]{9}

B.

\d{3}[A-Z]{9}

C.

\W{3}[A-Z]{9}

D.

{3}\d{9}[A-Z]

Question 18

Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?

Options:

A.

Basic Authentication

B.

No Authentication

C.

Microsoft 365 Authentication

D.

Cisco Security Cloud Sign On

Question 19

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?

Options:

A.

Enable the DKIM service checker

B.

Export the DNS TXT record to provide to the DNS registrar

C.

Import the DNS record of the service provider into the Cisco Secure Email Gateway.

D.

Configure the Trusted Sender Group message authenticity policy.

Question 20

The security administrator wants to configure alerts on Cisco Secure Email Gateway for outbreak filters. Which two actions must be taken to meet the requirement? (Choose two.)

Options:

A.

From Outbreak Filters Global Settings, enable the alerts for the outbreak filters.

B.

Enable the alerts for the outbreak filters by using an Adaptive Rule.

C.

From Mail Policies, configure the Outbreak Filters settings.

D.

From System Administration enable message splintering.

E.

From Security Services, configure the Outbreak Filters settings.

Question 21

An engineer must provide differentiated email filtering to executives within the organization Which two actions must be taken to accomplish this task? (Choose two)

Options:

A.

Define an LDAP group query to specify users to whom the mail policy rules apply.

B.

Create content filters for actions to take on messages that contain specific data

C.

Upload a csv file containing the email addresses for the users for whom you want to create mail policies.

D.

Enable the content-scanning features you want to use with mail policies

E.

Define the default mail policies for incoming or outgoing messages

Question 22

A trusted partner of an organization recently experienced a new campaign that was leveraging JavaScript attachments to trick users into executing malware. As a result, they created a local policy to deny messages with JavaScript attachments. Which action should the administrator of the organization take to ensure encrypted communications are delivered to the intended partner recipient?

Options:

A.

Insert the X-PostX-Use-Script ' header with a value of false to the encrypted messages

B.

Select JavaScript-free ' option within the Cisco Secure Email Encryption Service Add-in

C.

Create an outgoing content filter and add the Encrypt and Deliver Nov/ action with Use-Script option deselected

D.

Create a new encryption profile and deselect the ' Use-Script ' envelope settings option.

Question 23

Which two steps are needed to disable local spam quarantine before external quarantine is enabled? (Choose two.)

Options:

A.

Uncheck the Enable Spam Quarantine check box.

B.

Select Monitor and click Spam Quarantine.

C.

Check the External Safelist/Blocklist check box.

D.

Select External Spam Quarantine and click on Configure.

E.

Select Security Services and click Spam Quarantine.

Question 24

Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)

Options:

A.

Paste in the Registration Token generated from the Smart Licensing Account

B.

Enable the Threat Response service under Network > Cloud Service Settings.

C.

Select the correct Threat Response Server based on your region.

D.

Paste in the Registration Token generated from the Security Services Exchange.

E.

Enable the Security Services Exchange service under Network > Cloud Service Settings

Question 25

What are two primary components of content filters? (Choose two.)

Options:

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Question 26

Refer to the exhibit.

Question # 26

An administrator has configured File Reputation and File Analysis on the Cisco Secure Email Gateway appliance however it does not function as expected What must be configured on the appliance for this to function?

Options:

A.

Upload the Root CA certificate for the File Reputation cloud to the Cisco Secure Email Gateway.

B.

Open port 443 on the firewall for the Cisco Secure Email Gateway to connect to the File Reputation cloud.

C.

Configure the Cisco Secure Email Gateway to use SSL for the connection to the File Reputation server

D.

Restart the File Reputation service to force the scanning engine to connect to the File Reputation cloud.

Question 27

Which action is allowed while managing list of certificate authorities on Cisco Secure Email Gateway?

Options:

A.

Export the list to the xml file.

B.

Remove the preinstalled list.

C.

Accept the selected certificate list.

D.

Enable the system list.

Question 28

What are organizations trying to address when implementing a SPAM quarantine?

Options:

A.

true positives

B.

false negatives

C.

false positives

D.

true negatives

Question 29

Refer to the exhibit.

Question # 29

Which SPF record is valid for mycompany.com?

Options:

A.

v=spf1 a mx ip4:199.209.31.2 -all

B.

v=spf1 a mx ip4:10.1.10.23 -all

C.

v=spf1 a mx ip4:199.209.31.21 -all

D.

v=spf1 a mx ip4:172.16.18.230 -all

Question 30

When a network engineer is troubleshooting a mail flow issue, they discover that some emails are rejected with an SMTP code of 451 and the error message " #4.7.1 Unable to perform DMARC verification " . In the DMARC verification profile on the Cisco Secure Email Gateway appliance, which action must be set for messages that result in temporary failure to prevent these emails from being rejected?

Options:

A.

Accept

B.

Ignore

C.

Quarantine

D.

No Action

Question 31

Refer to the exhibit.

Question # 31

What results from this filter configuration?

Options:

A.

Action is skipping all antivirus checks for the mail

B.

Action is applied to all mail that has the subject " FW: Bounce Notification. "

C.

Action is applied to all mail from test@cisco.com.

D.

Action is skipping all antispam checks for the mail.

Question 32

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

Options:

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Question 33

An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)

An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)

Options:

Question 34

Which action must be taken before a custom quarantine that is being used can be deleted?

Options:

A.

Delete the quarantine that is assigned to a filter.

B.

Delete the quarantine that is not assigned to a filter.

C.

Delete only the unused quarantine.

D.

Remove the quarantine from the message action of a filter.

Question 35

What is the default behavior of any listener for TLS communication?

Options:

A.

preferred-verify

B.

off

C.

preferred

D.

required

Question 36

A network engineer is reviewing the record presented.

Question # 36

Which type of DNS record would contain the record as per the DKIM public key RFC 6376?

Options:

A.

MX

B.

PTR

C.

SRV

D.

TXT

Question 37

Which two steps configure Forged Email Detection? (Choose two.)

Options:

A.

Configure a content dictionary with executive email addresses.

B.

Configure a filter to use the Forged Email Detection rule and dictionary.

C.

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.

Enable Forged Email Detection on the Security Services page.

E.

Configure a content dictionary with friendly names.

Question 38

Which two components form the graymail management solution in Cisco ESA? (Choose two.)

Options:

A.

cloud-based unsubscribe service

B.

uniform unsubscription management interface for end users

C.

secure subscribe option for end users

D.

integrated graymail scanning engine

E.

improved mail efficacy

Question 39

An engineer must share threat reporting information from Cisco Secure Email Gateway to Cisco SecureX. Which setting must be enabled in Secure Email Gateway?

Options:

A.

SNMP

B.

Security Services Exchange

C.

Cloud Service Settings

D.

System Monitor

Question 40

Which Cisco ESA security service is configured only through an outgoing mail policy?

Options:

A.

antivirus

B.

DLP

C.

Outbreak Filters

D.

AMP

Question 41

Which setting affects the aggressiveness of spam detection?

Options:

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Question 42

What is the order of virus scanning when multilayer antivirus scanning is configured?

Options:

A.

The default engine scans for viruses first and the McAfee engine scans for viruses second.

B.

The Sophos engine scans for viruses first and the McAfee engine scans for viruses second.

C.

The McAfee engine scans for viruses first and the default engine scans for viruses second.

D.

The McAfee engine scans for viruses first and the Sophos engine scans for viruses second.

Question 43

When virtual gateways are configured, which two distinct attributes are allocated to each virtual gateway address? (Choose two.)

Options:

A.

domain

B.

IP address

C.

DNS server address

D.

DHCP server address

E.

external spam quarantine

Question 44

Which SMTP extension does Cisco ESA support for email security?

Options:

A.

ETRN

B.

UTF8SMTP

C.

PIPELINING

D.

STARTTLS

Question 45

Which attack is mitigated by using Bounce Verification?

Options:

A.

spoof

B.

denial of service

C.

eavesdropping

D.

smurf

Question 46

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Question 47

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

Options:

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

Question 48

Which two components must be configured to perform DLP scanning? (Choose two.)

Options:

A.

Add a DLP policy on the Incoming Mail Policy.

B.

Add a DLP policy to the DLP Policy Manager.

C.

Enable a DLP policy on the Outgoing Mail Policy.

D.

Enable a DLP policy on the DLP Policy Customizations.

E.

Add a DLP policy to the Outgoing Content Filter.

Question 49

How does the graymail safe unsubscribe feature function?

Options:

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Question 50

A network engineer is integrating Cisco Secure Email Gateway with Cisco SecureX. Which two actions must be taken before registering Cisco Secure Email Gateway with Cisco SecureX? (Choose two.)

Options:

A.

Run the threatresponseconflg command in SecureX

B.

Open TCP port 22 on the firewall

C.

Open TCP port 443 on the firewall.

D.

Run the cloudserviceconflg command in SecureX

E.

Create an admin account in SecureX

Question 51

An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?

Options:

A.

Configure the outbound firewall rule to permit traffic on port 8081

B.

Enable the Use HTTP option under Advanced Settings for File Reputation.

C.

Enable the Use SSL option under Advanced Settings for File Reputation.

D.

Configure the outbound firewall rule to permit traffic on port 3237

E.

TP/HTTPS ports outbound and notices that the AMP file reputation

Question 52

Which type of attack does Bounce Verification fight against?

Options:

A.

identity

B.

backscatter

C.

phishing

D.

spear phishing

Question 53

Which feature must be activated on a Cisco Secure Email Gateway to combat backscatter?

Options:

A.

Graymail Detection

B.

Bounce Verification

C.

Forged Email Detection

D.

Bounce Profile

Question 54

Which benefit does enabling external spam quarantine on Cisco SMA provide?

Options:

A.

ability to back up spam quarantine from multiple Cisco ESAs to one central console

B.

access to the spam quarantine interface on which a user can release, duplicate, or delete

C.

ability to scan messages by using two engines to increase a catch rate

D.

ability to consolidate spam quarantine data from multiple Cisco ESA to one central console

Question 55

Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)

Options:

A.

accept

B.

relay

C.

delay

D.

route

E.

reject

Question 56

The CEO added a sender to a safelist but does not receive an important message expected from the trusted sender. An engineer evaluates message tracking on the Cisco Secure Email Gateway appliance and determines that the message was dropped by the antivirus engine. What is the reason for this behavior?

Options:

A.

The sender is included in an ISP blocklist

B.

Administrative access is required to create a safelist.

C.

The sender didn ' t mark the message as urgent

D.

End-user safelists apply to antispam engines only.

Question 57

Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?

Options:

A.

quarantine threat level

B.

antispam

C.

data loss prevention

D.

antivirus

Page: 1 / 19
Total 190 questions