Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > CCNP Security > 300-720

300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) Question and Answers

Question # 4

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

A.

SenderBase Reputation Filtering

B.

Connection Reputation Filtering

C.

Talos Reputation Filtering

D.

SpamCop Reputation Filtering

Full Access
Question # 5

A company has recently updated their security policy and now wants to drop all email messages larger than 100 MB coming from external sources. The Cisco Secure Email Gateway is LDAP integrated and all employee accounts are in the group " Employees " . Which filter rule configuration provides the desired outcome?

A.

if (mail-from-group == ' Employees ' ) and (body-size > " 100M " ) {drop()}

B.

if (mail-from-group != ' Employees ' ) and (body-size > 100M) {drop();}

C.

if (mail-from-group == ' Employees ' ) and (body-size > 100M) {bounce();}

D.

if ( ' mail-from-group != Employees ' ) and (body-size > 100M) {drop();}

Full Access
Question # 6

An engineer is tasked with reviewing mail logs to confirm that messages sent from domain abc.com are passing SPF verification and being accepted by the Cisco ESA. The engineer notices that SPF veri fication is not being performed and that SPF is not being referenced in the logs for messages sent from domain abc.com.

Why is the verification not working properly?

A.

SPF verification is disabled in the Recipient Access Table.

B.

SPF verification i s disabled on the Mail Flow Policy.

C.

The SPF conformance level is set to SIDF compatible on the Mail Flow Policy.

D.

An SPF verification Content Filter has not been created.

Full Access
Question # 7

An organization wants to use its existing Cisco ESA to host a new domain and enforce a separate corporate policy for that domain.

What should be done on the Cisco ESA to achieve this?

A.

Use the smtproutes command to configure a SMTP route for the new domain.

B.

Use the deli very config command to configure mail delivery for the new domain.

C.

Use the dsestconf command to add a separate destination for the new domain.

D.

Use the altrchost command to add a separate gateway for the new domain.

Full Access
Question # 8

The CEO added a sender to a safelist but does not receive an important message expected from the trusted sender. An engineer evaluates message tracking on the Cisco Secure Email Gateway appliance and determines that the message was dropped by the antivirus engine. What is the reason for this behavior?

A.

The sender is included in an ISP blocklist

B.

Administrative access is required to create a safelist.

C.

The sender didn ' t mark the message as urgent

D.

End-user safelists apply to antispam engines only.

Full Access
Question # 9

A Cisco ESA administrator has noticed that new messages being sent to the Centralized Policy Quarantine are being released after one hour. Previously, they were being held for a day before being released.

What was configured that caused this to occur?

A.

The retention period was changed to one hour.

B.

The threshold settings were set to override the clock se ttings.

C.

The retention period was set to default.

D.

The threshold settings were set to default.

Full Access
Question # 10

Refer to the exhibit.

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

A.

skip-filters

B.

log-entry

C.

spf-status

D.

quarantine

Full Access
Question # 11

An organization has multiple Cisco Secure Email Gateway appliances deployed, resulting in several spam quarantines to manage. To manage the quarantined messages, the administrator enabled the centralized spam quarantine on the Cisco Secure Email and Web Manager appliance and configured the external spam quarantine on the Cisco Secure Email Gateway appliances. However, messages are still being directed to the local quarantine on the Cisco Secure Email Gateway appliances What change is necessary to complete the configuration?

A.

Modify the incoming mail policies on the Cisco Secure Email Gateway appliances to redirect to the external quarantine

B.

Disable the external spam quarantine on the Cisco Secure Email Gateway appliances

C.

Disable the local spam quarantine on the Cisco Secure Email Gateway appliances.

D.

Modify the external spam quarantine settings on the Cisco Secure Email Gateway appliances and change the port to 25

Full Access
Question # 12

Which Cisco ESA security service is configured only through an outgoing mail policy?

A.

antivirus

B.

DLP

C.

Outbreak Filters

D.

AMP

Full Access
Question # 13

Which predefined DLP category must be used by a network administrator to ensure that a company employee cannot send credit card information outside the company?

A.

Company Confidential

B.

Regulatory Compliance

C.

Intellectual Property Protection

D.

Acceptable Use

Full Access
Question # 14

Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?

A.

A policy quarantine is missing.

B.

More than one email pipeline is defined.

C.

The " modify the message subject " is already set.

D.

The " add custom header " action is performed first.

Full Access
Question # 15

An engineer must provide user access to the spam quarantine on a Cisco Secure Email Gateway. Users must be able to access the spam quarantine without additional authentication by using links. The users must be able to preview a spam message from within the Spam Quarantine section without restoring the message. Drag and drop the actions from the left into sequence on the right to meet the requirements.

Full Access
Question # 16

An engineer must configure Cisco Secure Email Gateway to scan all email from the HR department for viruses. The Sophos scanning engine must be used, and messages that potentially

still contain viruses after repair must be quarantined. These configurations were performed already:

•Enable antivirus scanning on the email gateway.

•Create a mail policy for the HR department.

Which two actions must be taken to complete the configuration? (Choose two.)

A.

From the Message Scanning settings, enable Scan and Repair Viruses.

B.

Configure Virus Infected Message Handling to quarantine the messages.

C.

From the Message Scanning settings, enable the dropping of attachments.

D.

From the Message Scanning settings, enable Scan for Viruses only.

E.

Configure Unscannable Message Handling to quarantine the messages.

Full Access
Question # 17

A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.

What is the reason of this?

A.

The Tram* header is checked against all policies in a top-down fashion.

B.

The message header with the highest priority is checked ag ainst each policy in a top-down fashion.

C.

The To " header is checked against all policies in a top-down fashion.

D.

The message header with the highest priority is checked against the Default policy in a top-down fashion.

Full Access
Question # 18

Refer to the exhibit.

What results from this filter configuration?

A.

Action is skipping all antivirus checks for the mail

B.

Action is applied to all mail that has the subject " FW: Bounce Notification. "

C.

Action is applied to all mail from test@cisco.com.

D.

Action is skipping all antispam checks for the mail.

Full Access
Question # 19

Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?

A.

Basic Authentication

B.

No Authentication

C.

Microsoft 365 Authentication

D.

Cisco Security Cloud Sign On

Full Access
Question # 20

Which two features are applied to either incoming or outgoing mail policies? (Choose two.)

A.

Indication of Compromise

B.

application filtering

C.

outbreak filters

D.

sender reputation filtering

E.

antivirus

Full Access
Question # 21

What are two phases of the Cisco ESA email pipeline? (Choose two.)

A.

reject

B.

workqueue

C.

action

D.

delivery

E.

quarantine

Full Access
Question # 22

Drag and drop the actions from the left into sequence on the right to validate the authenticity of email on a Cisco Secure Email Gateway by using DNS records.

Full Access
Question # 23

Refer to the exhibit. How does a Cisco Secure Email Gateway handle an email that is identified both as spam positive and outbreak positive by outbreak filters?

A.

The email is sent to outbreak quarantine and is rescanned for spam before being released.

B.

The email is sent only to the outbreak quarantine.

C.

The email is sent to spam quarantine and outbreak quarantine.

D.

The email is sent only to the spam quarantine.

Full Access
Question # 24

What are two primary components of content filters? (Choose two.)

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Full Access
Question # 25

Which action is a valid fallback when a client certificate is unavailable during SMTP authentication on Cisco ESA?

A.

LDAP Query

B.

SMTP AUTH

C.

SMTP TLS

D.

LDAP BIND

Full Access
Question # 26

Which two components must be configured to perform DLP scanning? (Choose two.)

A.

Add a DLP policy on the Incoming Mail Policy.

B.

Add a DLP policy to the DLP Policy Manager.

C.

Enable a DLP policy on the Outgoing Mail Policy.

D.

Enable a DLP policy on the DLP Policy Customizations.

E.

Add a DLP policy to the Outgoing Content Filter.

Full Access
Question # 27

Refer to the exhibit.

Which SPF record is valid for mycompany.com?

A.

v=spf1 a mx ip4:199.209.31.2 -all

B.

v=spf1 a mx ip4:10.1.10.23 -all

C.

v=spf1 a mx ip4:199.209.31.21 -all

D.

v=spf1 a mx ip4:172.16.18.230 -all

Full Access
Question # 28

Refer to the exhibits. What must be done to enforce end user authentication before accessing quarantine?

A.

Enable SPAM notification and use LDAP for authentication.

B.

Enable SPAM Quarantine Notification and add the %quarantine_url% variable.

C.

Change the end user quarantine access from Non e authentication to SAAS.

D.

Change the end user quarantine access setting from None authentication to Mailbox.

Full Access
Question # 29

What occurs when configuring separate incoming mail policies?

A.

message splintering

B.

message exceptions

C.

message detachment

D.

message aggregation

Full Access
Question # 30

A security administrator deployed a Cisco Secure Email Gateway appliance with a mail policy configured to store suspected spam for review. The appliance is the DMZ and only the standard HTTP/HTTPS ports are allowed by the firewall. An administrator wants to ensure that users can view any suspected spam that was blocked. Which action must be taken to meet this requirement?

A.

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

B.

Enable the Spam Quarantine and leave the default settings unchanged.

C.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

D.

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

Full Access
Question # 31

An administrator notices that incoming emails with certain attachments do not get delivered to all recipients when the emails have multiple recipients in different domains like cisco.com and test.com. The same emails when sent only to recipients in cisco.com are delivered properly. How must the Cisco Secure Email Gateway be configured to avoid this behavior?

A.

Modify mail policies for cisco.com to ensure that emails are not dropped.

B.

Modify mail policies so email recipients do not match multiple policies.

C.

Modify DLP configuration to ensure that all attachments are permitted for test.com.

D.

Modify DLP configuration to exempt DLP scanning for messages sent to test.com domain

Full Access
Question # 32

A Cisco Secure Email Gateway administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?

A.

Accept

B.

Delay

C.

Relay

D.

Reject

Full Access
Question # 33

Refer to the exhibit. An engineer is trying to connect to a Cisco E SA using SSH and has been unsuccessful. Upon further inspection, the engineer notices that there is a loss of connectivity to the neighboring switch.

Which connection method should be used to determine the configuration issue?

A.

Telnet

B.

HTTPS

C.

Ethernet

D.

serial

Full Access
Question # 34

A company has deployed a new mandate that requires all emails sent externally from the Sales Department to be scanned by DLP for PCI-DSS compliance. A new DLP policy has been created on the Cisco ESA and needs to be assigned to a mail policy named ‘Sales’ that has yet to be create d.

Which mail policy should be created to accomplish this task?

A.

Outgoing Mail Policy

B.

Preliminary Mail Policy

C.

Incoming Mail Flow Policy

D.

Outgoing Mail Flow Policy

Full Access
Question # 35

Refer to the exhibit. A security engineer must configure a Cisco Secure Email Gateway to ensure that encryption is enabled and the configured profile is provisioned. Which command must be used?

A.

setup

B.

check encryption

C.

provision

D.

profiles

Full Access
Question # 36

Which setting affects the aggressiveness of spam detection?

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Full Access
Question # 37

Which process is skipped when an email is received from safedomain.com, which is on the safelist?

A.

message filter

B.

antivirus scanning

C.

outbreak filter

D.

antispam scanning

Full Access
Question # 38

An engineer must configure Directory Harvest Attack Prevention for SMTP in Cisco Secure Email Gateway. This error message must be sent when the listener receives more than 50 invalid

recipients per hour.

•500 - Too many requests

•Max. Invalid Recipients Per Hour was set to 50 already.

Which two actions must be taken next to set maximum invalid recipients per hour to meet the requirement? (Choose two.)

A.

Create Max. Recipients Per Hour Code to 500.

B.

Apply Max. Recipients Per Hour Text to 500 - Too many requests.

C.

Configure Max. Recipients Per Hour Code to 500.

D.

Set Max. Recipients Per Hour Text to Too many requests.

E.

Implement Max. Recipients Per Hour Text to 500 - Too many requests.

Full Access
Question # 39

Refer to the exhibit.

For improved security, an administrator wants to warn users about opening any links or attachments within an email How must the administrator configure an HTML-coded message at the top of an email body to create this warning?

A.

Create a text resource type of Disclaimer Template paste the HTML code into the text box. then use this text resource inside a content filter

B.

Create a text resource type of Disclaimer Template change to code view to paste the HTML code into the text box, then use this text resource inside a content filter

C.

Create a text resource type of Notification Template, paste the HTML code into the text box, then use this text resource inside a content filter.

D.

Create a text resource type of Notification Template, change to code view to paste the HTML code into the text box. then use this text resource inside a content filter.

Full Access
Question # 40

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

A.

83

B.

82

C.

443

D.

80

Full Access
Question # 41

A company ' s CFO is requesting the email administrator create an exception for graymail from a certain yoga studio ' s weekly newsletter. Which category of graymail does this fall under?

A.

Mass

B.

Marketing

C.

Social Network

D.

Sales

Full Access
Question # 42

What is a benefit of implementing URL filtering on the Cisco ESA?

A.

removes threats from malicious URLs

B.

blacklists spam

C.

provides URL reputation protection

D.

enhances reputation against malicious URLs

Full Access
Question # 43

Which type of attack is prevented by configuring file reputation filtering and file analysis features?

A.

denial of service

B.

zero-day

C.

backscatter

D.

phishing

Full Access
Question # 44

Which two factors must be considered when message filter processing is configured? (Choose two.)

A.

message-filter order

B.

lateral processing

C.

structure of the combined packet

D.

mail policies

E.

MIME structure of the message

Full Access
Question # 45

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

Full Access
Question # 46

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

A.

default

B.

system

C.

user

D.

custom

E.

demo

Full Access
Question # 47

Email encryption is configured on a Cisco ESA that uses CRES.

Which action is taken on a message when CRES is unavailable?

A.

It is requeued.

B.

It is sent in clear text.

C.

It is dropped and an error message is sent to the sender.

D.

It is encrypted by a Cisco encryption appliance.

Full Access
Question # 48

What is needed to sign outbound emails using Domain Keys Identified Mail after a signing profile is created in the Cisco Secure Email Gateway?

A.

Configure in destination controls.

B.

Enable DKIM in an outbound content filter.

C.

Enable DKIM in the mail flow policy.

D.

A signing profile referencing the sender domain is sufficient.

Full Access
Question # 49

Which type of attack does Bounce Verification fight against?

A.

identity

B.

backscatter

C.

phishing

D.

spear phishing

Full Access
Question # 50

Which type of DNS record would contain the following line, which references the DKIM public key per RFC 6376?

v=DKIM1; p=76E629F05F709EF665853333EEC3F5ADE69A2362BECE406582670456943283BE

A.

CNAME

B.

AAAA

C.

TXT

D.

PTR

Full Access
Question # 51

When virtual gateways are configured, which two distinct attributes are allocated to each virtual gateway address? (Choose two.)

A.

domain

B.

IP address

C.

DNS server address

D.

DHCP server address

E.

external spam quarantine

Full Access
Question # 52

Drag and drop the actions from the left into the sequence on the right to configure directory harvest prevention in Cisco Secure Email Gateway.

Full Access
Question # 53

Refer to the exhibit. How does the Cisco Secure Email Gateway handle an email with an unknown Microsoft Word document?

A.

The email is quarantined.

B.

The email is dropped.

C.

The file is sent to the cloud for file analysis.

D.

The email is delivered without file analysis.

Full Access
Question # 54

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)

A.

DKIM

B.

Public Keys

C.

Domain Keys

D.

Symmetric Keys

E.

Private Keys

Full Access
Question # 55

Which two query types are available when an LDAP profile is configured? (Choose two.)

A.

proxy consolidation

B.

user

C.

recursive

D.

group

E.

routing

Full Access
Question # 56

A network engineer is integrating Cisco Secure Email Gateway with Cisco SecureX. Which two actions must be taken before registering Cisco Secure Email Gateway with Cisco SecureX? (Choose two.)

A.

Run the threatresponseconflg command in SecureX

B.

Open TCP port 22 on the firewall

C.

Open TCP port 443 on the firewall.

D.

Run the cloudserviceconflg command in SecureX

E.

Create an admin account in SecureX

Full Access
Question # 57

An engineer is configuring a Cisco ESA for the first time and needs to ensure that any email traffic coming from the internal SMTP servers is relayed out through the Cisco ESA and is tied to the Outgoing Mail Policies.

Which Mail Flow Policy setting should be modified to accomplish this goal?

A.

Exception List

B.

Connection Behavior

C.

Bounce Detection Signing

D.

Reverse Connection Verification

Full Access