Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

300-720 Exam Dumps - Securing Email with Cisco Email Security Appliance (300-720 SESA)

Question # 4

What are two primary components of content filters? (Choose two.)

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Full Access
Question # 5

An engineer wants to utilize a digital signature in outgoing emails to validate to others that the email they are receiving was indeed sent and authorized by the owner of that domain Which two components should be configured on the Cisco Secure Email Gateway appliance to achieve this? (Choose two.)

A.

DMARC verification profile

B.

SPF record

C.

Public/Private keypair

D.

Domain signing profile

E.

PKI certificate

Full Access
Question # 6

Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?

A.

traffic between the Cisco Secure Email Gateway and the LDAP server

B.

emails being delivered from the Cisco Secure Email Gateway

C.

HTTPS traffic when connecting to the web user interface of the Cisco Secure Email Gateway

D.

emails being received by the Cisco Secure Email Gateway

Full Access
Question # 7

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

A.

message-ID

B.

sender

C.

URL reputation

D.

from

E.

mail-from

Full Access
Question # 8

An email containing a URL passes through the Cisco ESA that has content filtering disabled for all mail policies. The sender is sampleuser@test1.com, the recipients are testuser1@test2.com, testuser2@test2.com, testuser3@test2.com, and mailer1@test2.com. The subject of the email is Test Document395898847. An administrator wants to add a policy to ensure that the Cisco ESA evaluates the web reputation score before permitting this email.

Which two criteria must be used by the administrator to achieve this? (Choose two.)

A.

Subject contains Test Document"

B.

Sender matches test1.com

C.

Email body contains a URL

D.

Date and time of email

E.

Email does not match mailer1@test2.com

Full Access
Question # 9

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Full Access
Question # 10

An Encryption Profile has been set up on the Cisco ESA.

Drag and drop the steps from the left for creating an outgoing content filter to encrypt emails that contains the subject "Secure:" into the correct order on the right.

Full Access
Question # 11

An engineer must provide differentiated email filtering to executives within the organization Which two actions must be taken to accomplish this task? (Choose two)

A.

Define an LDAP group query to specify users to whom the mail policy rules apply.

B.

Create content filters for actions to take on messages that contain specific data

C.

Upload a csv file containing the email addresses for the users for whom you want to create mail policies.

D.

Enable the content-scanning features you want to use with mail policies

E.

Define the default mail policies for incoming or outgoing messages

Full Access
Question # 12

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

A.

83

B.

82

C.

443

D.

80

Full Access
Question # 13

Which benefit does enabling external spam quarantine on Cisco SMA provide?

A.

ability to back up spam quarantine from multiple Cisco ESAs to one central console

B.

access to the spam quarantine interface on which a user can release, duplicate, or delete

C.

ability to scan messages by using two engines to increase a catch rate

D.

ability to consolidate spam quarantine data from multiple Cisco ESA to one central console

Full Access
Question # 14

Refer to the exhibit.

Which additional configuration action must be taken to protect against Directory Harvest Attacks?

A.

When LDAP Queries are configured, Directory Harvest Attack Prevention is enabled by default.

B.

In the LDAP Server profile, configure Directory Harvest Attack Prevention

C.

In the mail flow policy, configure Directory Harvest Attack Prevention.

D.

In the Listener Settings, modify the LDAP Queries configuration to use the Work Queue

Full Access
Question # 15

The CEO sent an email indicating that all emails containing a string of 123ABCDEFGHJ cannot be delivered and must be sent into quarantine for further inspection. Given the requirement, which regular expression should be used to match on that criteria?

A.

\\D{3}[A-Z]{9}

B.

\d{3}[A-Z]{9}

C.

\W{3}[A-Z]{9}

D.

{3}\d{9}[A-Z]

Full Access
Question # 16

Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?

A.

Add an additional mapping for attachment type for zip files.

B.

Enable assume match pattern if the email was not scanned for any reason.

C.

Increase the maximum recursion depth from 5 to a larger value.

D.

Increase the maximum attachment size to scan to a larger value.

Full Access
Question # 17

Refer to the exhibit.

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

A.

skip-filters

B.

log-entry

C.

spf-status

D.

quarantine

Full Access
Question # 18

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Full Access
Question # 19

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Full Access
Question # 20

A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?

A.

Non-Viral threat detection requires Antivirus or AMP enablement to properly function

B.

The Outbreak Filters option Graymail Header must be enabled

C.

Non-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function.

D.

The Outbreak Filters option URL Rewriting must be enabled.

Full Access
Question # 21

Which setting affects the aggressiveness of spam detection?

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Full Access
Question # 22

Which action on the Cisco ESA provides direct access to view the safelist/blocklist?

A.

Show the SLBL cache on the CLI.

B.

Monitor Incoming/Outgoing Listener.

C.

Export the SLBL to a .csv file.

D.

Debug the mail flow policy.

Full Access
Question # 23

Which two action types are performed by Cisco ESA message filters? (Choose two.)

A.

non-final actions

B.

filter actions

C.

discard actions

D.

final actions

E.

quarantine actions

Full Access
Question # 24

The company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data Users must be able to flag the messages that require encryption versus a Cisco Secure Email Gateway appliance scanning all messages and automatically encrypting via detection Which action enables this capability?

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

Full Access
Question # 25

An administrator notices that incoming emails with certain attachments do not get delivered to all recipients when the emails have multiple recipients in different domains like cisco.com and test.com. The same emails when sent only to recipients in cisco.com are delivered properly. How must the Cisco Secure Email Gateway be configured to avoid this behavior?

A.

Modify mail policies for cisco.com to ensure that emails are not dropped.

B.

Modify mail policies so email recipients do not match multiple policies.

C.

Modify DLP configuration to ensure that all attachments are permitted for test.com.

D.

Modify DLP configuration to exempt DLP scanning for messages sent to test.com domain

Full Access
Question # 26

An organization wants to prevent proprietary patent documents from being shared externally via email. The network administrator reviewed the DLP policies on the Cisco Secure Email Gateway and could not find an existing policy with the appropriate matching patterns. Which type of DLP policy template must be used to create a policy that meets this requirement?

A.

privacy protection

B.

custom policy

C.

regulatory compliance

D.

acceptable use

Full Access
Question # 27

What is the default behavior of any listener for TLS communication?

A.

preferred-verify

B.

off

C.

preferred

D.

required

Full Access
Question # 28

Refer to the exhibit. What is the correct order of commands to set filter 2 to active?

A.

filters-> edit-> 2-> Active

B.

filters-> modify-> All-> Active

C.

filters-> detail-> 2-> 1

D.

filters-> set-> 2-> 1

Full Access
Question # 29

Which two steps configure Forged Email Detection? (Choose two.)

A.

Configure a content dictionary with executive email addresses.

B.

Configure a filter to use the Forged Email Detection rule and dictionary.

C.

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.

Enable Forged Email Detection on the Security Services page.

E.

Configure a content dictionary with friendly names.

Full Access
Question # 30

What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

A.

8025

B.

6443

C.

6025

D.

8443

Full Access
Question # 31

What are organizations trying to address when implementing a SPAM quarantine?

A.

true positives

B.

false negatives

C.

false positives

D.

true negatives

Full Access
Question # 32

The CEO added a sender to a safelist but does not receive an important message expected from the trusted sender. An engineer evaluates message tracking on the Cisco Secure Email Gateway appliance and determines that the message was dropped by the antivirus engine. What is the reason for this behavior?

A.

The sender is included in an ISP blocklist

B.

Administrative access is required to create a safelist.

C.

The sender didn't mark the message as urgent

D.

End-user safelists apply to antispam engines only.

Full Access
Question # 33

An administrator notices that the Cisco Secure Email Gateway delivery queue on an appliance is consistently full. After further investigation, it is determined that the IP addresses currently in use by appliance are being rate-limited by some destinations. The administrator creates a new interface with an additional IP address using virtual gateway technology, but the issue is not solved Which configuration change resolves the issue?

A.

Use the CLI command altsrchost to set the new interface as the source IP address for all mail.

B.

Use the CLI command loadbalance auto to enable mail delivery over all interfaces.

C.

Use the CLI command alt-src-host to set the new interface as a possible delivery candidate.

D.

Use the CLI command deliveryconfig to set the new interface as the primary interface for mail delivery

Full Access
Question # 34

Which two action types are performed by Cisco ESA message filters? (Choose two.)

A.

non-final actions

B.

filter actions

C.

discard actions

D.

final actions

E.

quarantine actions

Full Access
Question # 35

Drag and drop the Cisco ESA reactions to a possible DLP from the left onto the correct action types on the right.

Full Access
Question # 36

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Full Access
Question # 37

Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)

A.

Paste in the Registration Token generated from the Smart Licensing Account

B.

Enable the Threat Response service under Network>Cloud Service Settings.

C.

Select the correct Threat Response Server based on your region.

D.

Paste in the Registration Token generated from the Security Services Exchange.

E.

Enable the Security Services Exchange service under Network>Cloud Service Settings

Full Access
Question # 38

When DKIM signing is configured, which DNS record must be updated to load the DKIM public signing key?

A.

AAAA record

B.

PTR record

C.

TXT record

D.

MX record

Full Access
Question # 39

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

A.

DHAP

B.

SBRS

C.

LDAP

D.

SMTP

Full Access
Question # 40

An organization wants to use its existing Cisco ESA to host a new domain and enforce a separate corporate policy for that domain.

What should be done on the Cisco ESA to achieve this?

A.

Use the smtproutes command to configure a SMTP route for the new domain.

B.

Use the deli very config command to configure mail delivery for the new domain.

C.

Use the dsestconf command to add a separate destination for the new domain.

D.

Use the altrchost command to add a separate gateway for the new domain.

Full Access
Question # 41

When the Cisco ESA is configured to perform antivirus scanning, what is the default timeout value?

A.

30 seconds

B.

90 seconds

C.

60 seconds

D.

120 seconds

Full Access
Question # 42

What is a benefit of implementing URL filtering on the Cisco ESA?

A.

removes threats from malicious URLs

B.

blacklists spam

C.

provides URL reputation protection

D.

enhances reputation against malicious URLs

Full Access
Question # 43

Email encryption is configured on a Cisco ESA that uses CRES.

Which action is taken on a message when CRES is unavailable?

A.

It is requeued.

B.

It is sent in clear text.

C.

It is dropped and an error message is sent to the sender.

D.

It is encrypted by a Cisco encryption appliance.

Full Access
Question # 44

Which two configurations are used on multiple LDAP servers to connect with Cisco ESA? (Choose two.)

A.

load balancing

B.

SLA monitor

C.

active-standby

D.

failover

E.

active-active

Full Access