Weekend Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! 300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) is now Stable and With Pass Result

300-720 Practice Exam Questions and Answers

Securing Email with Cisco Email Security Appliance (300-720 SESA)

Last Update 14 hours ago
Total Questions : 147

Securing Email with Cisco Email Security Appliance (300-720 SESA) is stable now with all latest exam questions are added 14 hours ago. Incorporating 300-720 practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the Securing Email with Cisco Email Security Appliance (300-720 SESA) exam format, identifying knowledge gaps, applying theoretical knowledge in Cisco practical scenarios, you are setting yourself up for success. 300-720 exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

300-720 exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through 300-720 dumps allows you to practice pacing yourself, ensuring that you can complete all Securing Email with Cisco Email Security Appliance (300-720 SESA) exam questions within the allotted time frame without sacrificing accuracy.

300-720 PDF

300-720 PDF (Printable)
$53.2
$132.99

300-720 Testing Engine

300-720 PDF (Printable)
$58
$144.99

300-720 PDF + Testing Engine

300-720 PDF (Printable)
$72.8
$181.99
Question # 1

Refer to the exhibit.

Question # 1

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

Options:

A.  

skip-filters

B.  

log-entry

C.  

spf-status

D.  

quarantine

Discussion 0
Question # 2

Email encryption is configured on a Cisco ESA that uses CRES.

Which action is taken on a message when CRES is unavailable?

Options:

A.  

It is requeued.

B.  

It is sent in clear text.

C.  

It is dropped and an error message is sent to the sender.

D.  

It is encrypted by a Cisco encryption appliance.

Discussion 0
Question # 3

What are the two different phases in the process of Cisco Secure Email Gateway performing S/MIME encryption? (Choose two.)

Options:

A.  

Attach the encrypted public key to the message

B.  

Encrypt the message body using the session key

C.  

Send the encrypted message to the sender

D.  

Attach the encrypted symmetric key to the message

E.  

Create a pseudo-random session key.

Discussion 0
Question # 4

Which restriction is in place for end users accessing the spam quarantine on Cisco Secure Email Gateway appliances?

Options:

A.  

Access via a link in a notification is mandatory.

B.  

The end user must be assigned to the Guest role

C.  

Direct access via web browser requires authentication.

D.  

Authentication is required when accessing via a link in a notification.

Discussion 0
Question # 5

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

Options:

A.  

DHAP

B.  

SBRS

C.  

LDAP

D.  

SMTP

Discussion 0
Question # 6

An engineer is configuring an SMTP authentication profile on a Cisco ESA which requires certificate verification.

Which section must be configured to accomplish this goal?

Options:

A.  

Mail Flow Policies

B.  

Sending Profiles

C.  

Outgoing Mail Policies

D.  

Verification Profiles

Discussion 0
Question # 7

Which type of attack is prevented by configuring file reputation filtering and file analysis features?

Options:

A.  

denial of service

B.  

zero-day

C.  

backscatter

D.  

phishing

Discussion 0
Question # 8

The CEO sent an email indicating that all emails containing a string of 123ABCDEFGHJ cannot be delivered and must be sent into quarantine for further inspection. Given the requirement, which regular expression should be used to match on that criteria?

Options:

A.  

\\D{3}[A-Z]{9}

B.  

\d{3}[A-Z]{9}

C.  

\W{3}[A-Z]{9}

D.  

{3}\d{9}[A-Z]

Discussion 0
Question # 9

What is the default behavior of any listener for TLS communication?

Options:

A.  

preferred-verify

B.  

off

C.  

preferred

D.  

required

Discussion 0
Question # 10

What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?

Options:

A.  

provisioned email encryption profile

B.  

message encryption from a content filter that select "Message Encryption" over TLS

C.  

message encryption from the mail flow policies with "CRES" selected

D.  

content filter to forward the email to the Cisco Registered Envelope server

Discussion 0
Question # 11

Refer to the exhibit.

Question # 11

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

Options:

A.  

skip-filters

B.  

log-entry

C.  

spf-status

D.  

quarantine

Discussion 0
Question # 12

Drag and drop the graymail descriptions from the left onto the verdict categories they belong to on the right.

Question # 12

Options:

Discussion 0
Question # 13

Which two steps configure Forged Email Detection? (Choose two.)

Options:

A.  

Configure a content dictionary with executive email addresses.

B.  

Configure a filter to use the Forged Email Detection rule and dictionary.

C.  

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.  

Enable Forged Email Detection on the Security Services page.

E.  

Configure a content dictionary with friendly names.

Discussion 0
Question # 14

An organization has a strict policy on URLs embedded in emails. The policy allows visibility into what the URL is but does not allow the user to click it. Which action must be taken to meet the requirements of the security policy?

Options:

A.  

Enable the URL quarantine policy

B.  

Defang the URL.

C.  

Replace the URL with text

D.  

Redirect the URL to the Cisco security proxy

Discussion 0
Question # 15

Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?

Options:

A.  

traffic between the Cisco Secure Email Gateway and the LDAP server

B.  

emails being delivered from the Cisco Secure Email Gateway

C.  

HTTPS traffic when connecting to the web user interface of the Cisco Secure Email Gateway

D.  

emails being received by the Cisco Secure Email Gateway

Discussion 0
Question # 16

Drag and drop the AsyncOS methods for performing DMARC verification from the left into the correct order on the right.

Question # 16

Options:

Discussion 0
Question # 17

An administrator notices that the Cisco Secure Email Gateway delivery queue on an appliance is consistently full. After further investigation, it is determined that the IP addresses currently in use by appliance are being rate-limited by some destinations. The administrator creates a new interface with an additional IP address using virtual gateway technology, but the issue is not solved Which configuration change resolves the issue?

Options:

A.  

Use the CLI command altsrchost to set the new interface as the source IP address for all mail.

B.  

Use the CLI command loadbalance auto to enable mail delivery over all interfaces.

C.  

Use the CLI command alt-src-host to set the new interface as a possible delivery candidate.

D.  

Use the CLI command deliveryconfig to set the new interface as the primary interface for mail delivery

Discussion 0
Question # 18

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)

Options:

A.  

DKIM

B.  

Public Keys

C.  

Domain Keys

D.  

Symmetric Keys

E.  

Private Keys

Discussion 0
Question # 19

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.  

Set up the interface group with the flag.

B.  

Issue the altsrchost command.

C.  

Map the envelope sender address to the host.

D.  

Apply a filter on the message.

Discussion 0
Question # 20

Drag and drop authentication options for End-User Quarantine Access from the left onto the corresponding configuration steps on the right.

Question # 20

Options:

Discussion 0
Question # 21

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

Options:

A.  

message-ID

B.  

sender

C.  

URL reputation

D.  

from

E.  

mail-from

Discussion 0
Question # 22

A Cisco ESA administrator has noticed that new messages being sent to the Centralized Policy Quarantine are being released after one hour. Previously, they were being held for a day before being released.

What was configured that caused this to occur?

Options:

A.  

The retention period was changed to one hour.

B.  

The threshold settings were set to override the clock settings.

C.  

The retention period was set to default.

D.  

The threshold settings were set to default.

Discussion 0
Question # 23

Which action on the Cisco ESA provides direct access to view the safelist/blocklist?

Options:

A.  

Show the SLBL cache on the CLI.

B.  

Monitor Incoming/Outgoing Listener.

C.  

Export the SLBL to a .csv file.

D.  

Debug the mail flow policy.

Discussion 0
Question # 24

What are organizations trying to address when implementing a SPAM quarantine?

Options:

A.  

true positives

B.  

false negatives

C.  

false positives

D.  

true negatives

Discussion 0
Question # 25

Which two are configured in the DMARC verification profile? (Choose two.)

Options:

A.  

name of the verification profile

B.  

minimum number of signatures to verify

C.  

ESA listeners to use the verification profile

D.  

message action into an incoming or outgoing content filter

E.  

message action to take when the policy is reject/quarantine

Discussion 0
Question # 26

An administrator needs to configure Cisco ESA to ensure that emails are sent and authorized by the owner of the domain. Which two steps must be performed to accomplish this task? (Choose two.)

Options:

A.  

Generate keys.

B.  

Create signing profile.

C.  

Create Mx record.

D.  

Enable SPF verification.

E.  

Create DMARC profile.

Discussion 0
Question # 27

What are two phases of the Cisco ESA email pipeline? (Choose two.)

Options:

A.  

reject

B.  

workqueue

C.  

action

D.  

delivery

E.  

quarantine

Discussion 0
Question # 28

Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)

Options:

A.  

accept

B.  

relay

C.  

delay

D.  

route

E.  

reject

Discussion 0
Question # 29

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

Options:

A.  

NetFlow

B.  

geolocation-based filtering

C.  

heuristic-based filtering

D.  

senderbase reputation filtering

E.  

content disarm and reconstruction

Discussion 0
Question # 30

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

Options:

A.  

SenderBase Reputation Filtering

B.  

Connection Reputation Filtering

C.  

Talos Reputation Filtering

D.  

SpamCop Reputation Filtering

Discussion 0
Question # 31

Which cloud service provides a reputation verdict for email messages based on the sender domain and other attributes?

Options:

A.  

Cisco AppDynamics

B.  

Cisco Secure Email Threat Defense

C.  

Cisco Secure Cloud Analytics

D.  

Cisco Talos

Discussion 0
Question # 32

Which SMTP extension does Cisco ESA support for email security?

Options:

A.  

ETRN

B.  

UTF8SMTP

C.  

PIPELINING

D.  

STARTTLS

Discussion 0
Question # 33

Which two action types are performed by Cisco ESA message filters? (Choose two.)

Options:

A.  

non-final actions

B.  

filter actions

C.  

discard actions

D.  

final actions

E.  

quarantine actions

Discussion 0
Question # 34

A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?

Options:

A.  

Non-Viral threat detection requires Antivirus or AMP enablement to properly function

B.  

The Outbreak Filters option Graymail Header must be enabled

C.  

Non-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function.

D.  

The Outbreak Filters option URL Rewriting must be enabled.

Discussion 0
Question # 35

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

Options:

A.  

redirect

B.  

return

C.  

drop

D.  

delay

E.  

abandon

Discussion 0
Question # 36

An organization wants to designate help desk personnel to assist with tickets that request the release of messages from the spam quarantine because company policy does not permit direct end-user access to the quarantine. Which two roles must be used to allow help desk personnel to release messages while restricting their access to make configuration changes in the Cisco Secure Email Gateway? (Choose two.)

Options:

A.  

Administrator

B.  

Help Desk User

C.  

Read-Only Operator

D.  

Technician

E.  

Quarantine Administrator

Discussion 0
Question # 37

What is the default behavior of any listener for TLS communication?

Options:

A.  

preferred-verify

B.  

off

C.  

preferred

D.  

required

Discussion 0
Question # 38

Which Cisco ESA security service is configured only through an outgoing mail policy?

Options:

A.  

antivirus

B.  

DLP

C.  

Outbreak Filters

D.  

AMP

Discussion 0
Question # 39

Question # 39

Question # 39

Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?

Options:

A.  

Add an additional mapping for attachment type for zip files.

B.  

Enable assume match pattern if the email was not scanned for any reason.

C.  

Increase the maximum recursion depth from 5 to a larger value.

D.  

Increase the maximum attachment size to scan to a larger value.

Discussion 0
Question # 40

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

Options:

A.  

83

B.  

82

C.  

443

D.  

80

Discussion 0
Question # 41

Question # 41

Refer to the exhibit. How should this configuration be modified to stop delivering Zero Day malware attacks?

Options:

A.  

Change Unscannable Action from Deliver As Is to Quarantine.

B.  

Change File Analysis Pending action from Deliver As Is to Quarantine.

C.  

Configure mailbox auto-remediation.

D.  

Apply Prepend on Modify Message Subject under Malware Attachments.

Discussion 0
Question # 42

When the Cisco ESA is configured to perform antivirus scanning, what is the default timeout value?

Options:

A.  

30 seconds

B.  

90 seconds

C.  

60 seconds

D.  

120 seconds

Discussion 0
Question # 43

Which setting affects the aggressiveness of spam detection?

Options:

A.  

protection level

B.  

spam threshold

C.  

spam timeout

D.  

maximum depth of recursion scan

Discussion 0
Question # 44

When URL logging is configured on a Cisco ESA, which feature must be enabled first?

Options:

A.  

antivirus

B.  

antispam

C.  

virus outbreak filter

D.  

senderbase reputation filter

Discussion 0
Get 300-720 dumps and pass your exam in 24 hours!

Free Exams Sample Questions