ExamGecko
Home / Cisco / 300-720 / List of questions
Ask Question

Cisco 300-720 Practice Test - Questions Answers, Page 11

List of questions

Question 101

Report
Export
Collapse

A Cisco Secure Email Gateway administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?

Accept

Accept

Delay

Delay

Relay

Relay

Reject

Reject

Suggested answer: C

Explanation:

Relay is the connection behavior that must be selected to properly process the messages. Relay allows Cisco ESA to accept messages from the specified source and deliver them to the intended destination, without applying any content or reputation filters.

To configure a mail flow policy with relay connection behavior on Cisco ESA, the administrator can follow these steps:

Select Mail Policies > Mail Flow Policies and click Add Policy.

Enter a name and description for the mail flow policy, such as Exchange Outbound.

Under Connection Behavior, select Relay.

Click Submit.

The other options are not valid connection behaviors to properly process the messages, because they either reject, delay, or accept the messages with content or reputation filters applied.

Reference: [User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway], page 6-2 and page 6-3.

asked 10/10/2024
Nito Nobel
44 questions

Question 102

Report
Export
Collapse

An organization wants to prevent proprietary patent documents from being shared externally via email. The network administrator reviewed the DLP policies on the Cisco Secure Email Gateway and could not find an existing policy with the appropriate matching patterns. Which type of DLP policy template must be used to create a policy that meets this requirement?

privacy protection

privacy protection

custom policy

custom policy

regulatory compliance

regulatory compliance

acceptable use

acceptable use

Suggested answer: B

Explanation:

Custom policy is a type of DLP policy template that must be used to create a policy that meets this requirement. Custom policy allows the administrator to define their own criteria for detecting sensitive or confidential data in messages, such as keywords, regular expressions, file types, etc.

To create a custom DLP policy on Cisco ESA, the administrator can follow these steps:

Select Mail Policies > DLP Policy Manager and click Add Policy.

Enter a name and description for the DLP policy, such as Patent Protection.

Under Policy Template, select Custom Policy.

Click Submit.

Under Content Matching Criteria, click Add Criteria.

Choose a matching type, such as Keyword or Regular Expression, and enter a value that matches the proprietary patent documents, such as "patent number" or "\d{4}/\d{6}".

Click Submit.

The other options are not valid types of DLP policy templates to create a policy that meets this requirement, because they are predefined templates that do not match the proprietary patent documents.

Reference: [User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway], page 9-3 and page 9-5.

asked 10/10/2024
Carol Phelps
35 questions

Question 103

Report
Export
Collapse

When a network engineer is troubleshooting a mail flow issue, they discover that some emails are rejected with an SMTP code of 451 and the error message "#4.7.1 Unable to perform DMARC verification". In the DMARC verification profile on the Cisco Secure Email Gateway appliance, which action must be set for messages that result in temporary failure to prevent these emails from being rejected?

Accept

Accept

Ignore

Ignore

Quarantine

Quarantine

No Action

No Action

Suggested answer: A

Explanation:

Accept is the action that must be set for messages that result in temporary failure to prevent these emails from being rejected. Accept allows Cisco ESA to deliver the messages without applying any DMARC actions or modifications.

To configure the accept action for messages that result in temporary failure on Cisco ESA, the administrator can follow these steps:

Select Mail Policies > DMARC Verification Profile and click Edit Settings for the DMARC verification profile that applies to the messages.

Under DMARC Actions, select Accept from the drop-down menu for Messages That Result in Temporary Failure.

Click Submit.

The other options are not valid actions for messages that result in temporary failure to prevent these emails from being rejected, because they either apply DMARC actions or modifications or do nothing.

Reference: [User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway], page 11-4 and page 11-5.

asked 10/10/2024
Kurt Woodfin
43 questions

Question 104

Report
Export
Collapse

A network engineer must tighten up the SPAM control policy of an organization due to a recent SPAM attack. In which scenario does enabling regional scanning improve security for this organization?

when most of the received spam comes from a specific country

when most of the received spam comes from a specific country

when most of the received spam originates outside of the U.S.

when most of the received spam originates outside of the U.S.

when most of the received email originates outside of the U.S.

when most of the received email originates outside of the U.S.

when most of the received email originates from a specific region

when most of the received email originates from a specific region

Suggested answer: D

Explanation:

Enabling regional scanning improves security for this organization when most of the received email originates from a specific region. Regional scanning is a feature that allows Cisco ESA to apply different spam thresholds and actions based on the geographic region of the sender's IP address, using a database of IP addresses and regions.

To enable regional scanning on Cisco ESA, the administrator can follow these steps:

Select Security Services > IronPort Anti-Spam and click Edit Settings.

Under Regional Scanning, select Enable Regional Scanning.

Click Submit.

Select Security Services > IronPort Anti-Spam > Regional Settings and click Add Region.

Choose a region from the drop-down menu, such as Asia Pacific.

Enter a spam threshold and an action for that region, such as 80 and Drop.

Click Submit.

asked 10/10/2024
Aparecido Primo
41 questions

Question 105

Report
Export
Collapse

DRAG DROP

Drag and drop the graymail descriptions from the left onto the verdict categories they belong to on the right.

Cisco 300-720 image Question 105 114475 10102024112745000
Correct answer: Cisco 300-720 image answer Question 105 114475 10102024112745000
asked 10/10/2024
Maurille AGBISSIKO
33 questions

Question 106

Report
Export
Collapse

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: <ceo@example com> must be entered. What must be added to the dictionary to accomplish this goal?

example.com

example.com

Example CEO

Example CEO

ceo

ceo

ceo@example com

ceo@example com

Suggested answer: D

Explanation:

[email protected] is the data that must be added to the dictionary to accomplish this goal. A content dictionary is a list of values that can be used as a condition in a content filter or a message filter. Forged Email Detection is a feature that allows Cisco ESA to detect and prevent email spoofing attacks, where the sender's address or domain is forged to appear as someone else, such as the CEO of the organization.

To create a content dictionary for use with Forged Email Detection on Cisco ESA, the administrator can follow these steps:

Select Mail Policies > Content Dictionaries and click Add Dictionary.

Enter a name and description for the content dictionary, such as CEO Email.

Under Dictionary Values, click Add Value.

Enter the email address of the CEO, such as [email protected].

Click Submit.

asked 10/10/2024
Jerry Manalo
32 questions

Question 107

Report
Export
Collapse

A security administrator deployed a Cisco Secure Email Gateway appliance with a mail policy configured to store suspected spam for review. The appliance is the DMZ and only the standard HTTP/HTTPS ports are allowed by the firewall. An administrator wants to ensure that users can view any suspected spam that was blocked. Which action must be taken to meet this requirement?

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

Enable the Spam Quarantine and leave the default settings unchanged.

Enable the Spam Quarantine and leave the default settings unchanged.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

Suggested answer: C

Explanation:

Enabling End-User Quarantine Access and pointing to an LDAP server for authentication is the action that must be taken to meet this requirement. End-User Quarantine Access is a feature that allows users to access their personal quarantine on Cisco ESA using their email address and password, without requiring an administrator account or access to Secure Email and Web Manager.

To enable End-User Quarantine Access on Cisco ESA, the administrator can follow these steps:

Select Security Services > IronPort Anti-Spam > End User Safelist/Blocklist Settings and click Edit Settings.

Under End User Quarantine Access, select Enable End User Quarantine Access.

Under Authentication Server, select LDAP Server from the drop-down menu and choose an LDAP server profile from the drop-down menu.

Click Submit.

asked 10/10/2024
Juan Carlos Yepez
36 questions

Question 108

Report
Export
Collapse

An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?

Configure the outbound firewall rule to permit traffic on port 8081

Configure the outbound firewall rule to permit traffic on port 8081

Enable the Use HTTP option under Advanced Settings for File Reputation.

Enable the Use HTTP option under Advanced Settings for File Reputation.

Enable the Use SSL option under Advanced Settings for File Reputation.

Enable the Use SSL option under Advanced Settings for File Reputation.

Configure the outbound firewall rule to permit traffic on port 3237

Configure the outbound firewall rule to permit traffic on port 3237

TP/HTTPS ports outbound and notices that the AMP file reputation

TP/HTTPS ports outbound and notices that the AMP file reputation

Suggested answer: E

Explanation:

Configuring the outbound firewall rule to permit traffic on port 3237 is the additional action that resolves the issue. AMP file reputation is a feature that allows Cisco ESA to check files attached to messages against a cloud-based database of known malicious files and apply appropriate actions, such as block, deliver, or quarantine.

By default, AMP file reputation uses TCP port 3237 to communicate with the cloud-based database.

If this port is blocked by a firewall, AMP file reputation will not work properly.

To resolve this issue, the administrator can configure the outbound firewall rule to permit traffic on port 3237 from Cisco ESA.

The other options are not valid actions to resolve the issue, because they do not affect the port used by AMP file reputation.

Reference: [User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway], page 7-5 and page 7-6.

asked 10/10/2024
Adam Bednar
38 questions

Question 109

Report
Export
Collapse

Refer to the exhibit.

Cisco 300-720 image Question 109 114479 10102024232745000000

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

skip-filters

skip-filters

log-entry

log-entry

spf-status

spf-status

quarantine

quarantine

Suggested answer: C

Explanation:

spf-status is the section of the filter that must be modified to correct this behavior. spf-status is a condition that determines whether a message matches the content filter rule based on the result of SPF verification, such as pass, fail, neutral, etc.

The content filter in the exhibit has a spf-status condition set to "Pass", which means that it will match messages that passed SPF verification and apply the action of "Quarantine". This is the opposite of what the network engineer intended to do.

To correct this behavior, the network engineer can modify the spf-status condition to "Fail", which means that it will match messages that failed SPF verification and apply the action of "Quarantine".

The other options are not valid sections of the filter that must be modified to correct this behavior, because they do not affect the spf-status condition.

Reference: [User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway], page 8-3 and page 8-4.

asked 10/10/2024
Jyoti Gupta
40 questions

Question 110

Report
Export
Collapse

Which restriction is in place for end users accessing the spam quarantine on Cisco Secure Email Gateway appliances?

Access via a link in a notification is mandatory.

Access via a link in a notification is mandatory.

The end user must be assigned to the Guest role

The end user must be assigned to the Guest role

Direct access via web browser requires authentication.

Direct access via web browser requires authentication.

Authentication is required when accessing via a link in a notification.

Authentication is required when accessing via a link in a notification.

Suggested answer: C

Explanation:

Direct access via web browser requires authentication is the restriction that is in place for end users accessing the spam quarantine on Cisco Secure Email Gateway appliances. Spam quarantine is a feature that allows Cisco ESA to store messages that are suspected to be spam and allow end users or administrators to review them and release or delete them as needed.

End users can access their personal spam quarantine on Cisco ESA either by clicking on a link in a notification email or by entering their email address and password in a web browser. In both cases, authentication is required to ensure security and privacy.

The other options are not valid restrictions that are in place for end users accessing the spam quarantine on Cisco Secure Email Gateway appliances, because they are either not mandatory or not related to authentication.

Reference: [User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway], page 10-2 and page 10-3.

asked 10/10/2024
Mariusz Szczubelek
35 questions
Total 148 questions
Go to page: of 15
Search

Related questions