ExamGecko
Home Home / Cisco / 300-720

Cisco 300-720 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











The company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data Users must be able to flag the messages that require encryption versus a Cisco Secure Email Gateway appliance scanning all messages and automatically encrypting via detection Which action enables this capability?

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

Answers
B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

Answers
C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

Answers
D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

Answers
Suggested answer: C

Explanation:

According to the [Cisco Secure Email Encryption Service Add-In User Guide], you can create an encryption profile that defines the encryption settings and options for your encrypted messages[2, p. 11]. You can also create an outgoing content filter that applies the encryption profile to the messages that match certain conditions, such as having [SECURE] in the subject header[2, p. 12]. This way, you can allow users to flag the messages that require encryption by adding [SECURE] to the subject line.

The other options are not valid because:

A. Creating an encryption profile with [SECURE] in the Subject setting and enabling encryption on the mail flow policy will not work, as the Subject setting in the encryption profile is used to specify the subject line of the encrypted message envelope, not the original message[2, p. 11].

B. Creating an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting will not work, as this will encrypt all outgoing messages regardless of whether they have [SECURE] in the subject line or not[2, p. 12].

D. Creating a DLP policy manager message action with encryption enabled and applying it to active DLP policies for outgoing mail will not work, as this will encrypt messages based on DLP rules that detect sensitive data in the message content, not based on user flags in the subject line.

An engineer wants to utilize a digital signature in outgoing emails to validate to others that the email they are receiving was indeed sent and authorized by the owner of that domain Which two components should be configured on the Cisco Secure Email Gateway appliance to achieve this?

(Choose two.)

A.

DMARC verification profile

A.

DMARC verification profile

Answers
B.

SPF record

B.

SPF record

Answers
C.

Public/Private keypair

C.

Public/Private keypair

Answers
D.

Domain signing profile

D.

Domain signing profile

Answers
E.

PKI certificate

E.

PKI certificate

Answers
Suggested answer: C, D

Explanation:

Public/Private keypair. A public/private keypair is a pair of cryptographic keys that are used to generate and verify digital signatures. The private key is used to sign the email message, while the public key is used to verify the signature. The public key is published in a DNS record, while the private key is stored on the Cisco Secure Email Gateway appliance[1, p. 2].

Domain signing profile. A domain signing profile is a configuration that specifies the domain and selector to use for signing outgoing messages, as well as the signing algorithm, canonicalization method, and header fields to include in the signature. You can create multiple domain signing profiles for different domains or subdomains[1, p. 3].

The other options are not valid because:

A. DMARC verification profile is not a component for utilizing a digital signature in outgoing emails. It is a component for verifying the authenticity of incoming emails based on SPF and DKIM results[2, p. 1].

B. SPF record is not a component for utilizing a digital signature in outgoing emails. It is a component for validating the sender IP address of incoming emails based on a list of authorized IP addresses published in a DNS record[3, p. 1].

E. PKI certificate is not a component for utilizing a digital signature in outgoing emails. It is a component for encrypting and decrypting email messages based on a certificate authority that issues and validates certificates[4, p. 1].

What is a category for classifying graymail?

A.

Malicious

A.

Malicious

Answers
B.

Marketing

B.

Marketing

Answers
C.

Spam

C.

Spam

Answers
D.

Priority

D.

Priority

Answers
Suggested answer: B

Explanation:

According to the [Cisco Secure Email User Guide], graymail is a category of email messages that are not spam but may be unwanted by some recipients, such as newsletters, promotions, or social media updates[5, p. 25]. Marketing is one of the subcategories of graymail that includes messages that advertise products or services[5, p. 26].

The other options are not valid because:

A. Malicious is not a category for classifying graymail. It is a category for classifying email messages that contain malicious content such as malware, phishing, or fraud[5, p. 25].

C. Spam is not a category for classifying graymail. It is a category for classifying email messages that are unsolicited, unwanted, or harmful[5, p. 25].

D. Priority is not a category for classifying graymail. It is a category for classifying email messages that are important, urgent, or relevant[5, p. 25].


Refer to the exhibit.

What results from this filter configuration?

A.

Action is skipping all antivirus checks for the mail

A.

Action is skipping all antivirus checks for the mail

Answers
B.

Action is applied to all mail that has the subject "FW: Bounce Notification."

B.

Action is applied to all mail that has the subject "FW: Bounce Notification."

Answers
C.

Action is applied to all mail from [email protected].

C.

Action is applied to all mail from [email protected].

Answers
D.

Action is skipping all antispam checks for the mail.

D.

Action is skipping all antispam checks for the mail.

Answers
Suggested answer: A

Refer to the exhibit.

Which additional configuration action must be taken to protect against Directory Harvest Attacks?

A.

When LDAP Queries are configured, Directory Harvest Attack Prevention is enabled by default.

A.

When LDAP Queries are configured, Directory Harvest Attack Prevention is enabled by default.

Answers
B.

In the LDAP Server profile, configure Directory Harvest Attack Prevention

B.

In the LDAP Server profile, configure Directory Harvest Attack Prevention

Answers
C.

In the mail flow policy, configure Directory Harvest Attack Prevention.

C.

In the mail flow policy, configure Directory Harvest Attack Prevention.

Answers
D.

In the Listener Settings, modify the LDAP Queries configuration to use the Work Queue

D.

In the Listener Settings, modify the LDAP Queries configuration to use the Work Queue

Answers
Suggested answer: C

Explanation:

To protect against Directory Harvest Attacks, the administrator must configure Directory Harvest

Attack Prevention in the mail flow policy that applies to the listener. This will enable the Cisco Secure

Email Gateway to reject or throttle messages that are sent to invalid recipients by checking the LDAP server for valid email addresses. Reference: [Cisco Secure Email Gateway Administrator Guide -Configuring Directory Harvest Attack Prevention]

An organization has multiple Cisco Secure Email Gateway appliances deployed, resulting in several spam quarantines to manage. To manage the quarantined messages, the administrator enabled the centralized spam quarantine on the Cisco Secure Email and Web Manager appliance and configured the external spam quarantine on the Cisco Secure Email Gateway appliances. However, messages are still being directed to the local quarantine on the Cisco Secure Email Gateway appliances What change is necessary to complete the configuration?

A.

Modify the incoming mail policies on the Cisco Secure Email Gateway appliances to redirect to the external quarantine

A.

Modify the incoming mail policies on the Cisco Secure Email Gateway appliances to redirect to the external quarantine

Answers
B.

Disable the external spam quarantine on the Cisco Secure Email Gateway appliances

B.

Disable the external spam quarantine on the Cisco Secure Email Gateway appliances

Answers
C.

Disable the local spam quarantine on the Cisco Secure Email Gateway appliances.

C.

Disable the local spam quarantine on the Cisco Secure Email Gateway appliances.

Answers
D.

Modify the external spam quarantine settings on the Cisco Secure Email Gateway appliances and change the port to 25

D.

Modify the external spam quarantine settings on the Cisco Secure Email Gateway appliances and change the port to 25

Answers
Suggested answer: C

Explanation:

To use the centralized spam quarantine on the Cisco Secure Email and Web Manager appliance, the administrator must disable the local spam quarantine on the Cisco Secure Email Gateway appliances.

This will prevent messages from being stored in both quarantines and avoid confusion for end users and administrators. Reference: [Cisco Secure Email and Web Manager User Guide - Configuring Centralized Spam Quarantine]

An organization has a strict policy on URLs embedded in emails. The policy allows visibility into what the URL is but does not allow the user to click it. Which action must be taken to meet the requirements of the security policy?

A.

Enable the URL quarantine policy

A.

Enable the URL quarantine policy

Answers
B.

Defang the URL.

B.

Defang the URL.

Answers
C.

Replace the URL with text

C.

Replace the URL with text

Answers
D.

Redirect the URL to the Cisco security proxy

D.

Redirect the URL to the Cisco security proxy

Answers
Suggested answer: B

Explanation:

To meet the security policy of allowing visibility into what the URL is but not allowing the user to click it, the administrator must defang the URL. This means that the URL will be modified in a way that it is still readable by humans but not clickable by browsers. For example, http://example.com could be defanged as hxxp://example[.]com. Reference: [Cisco Secure Email Gateway Administrator Guide -Defanging URLs in Messages]

Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?

A.

DER certificate and matching public key from a CA

A.

DER certificate and matching public key from a CA

Answers
B.

self-signed certificate in PKCS#7 format

B.

self-signed certificate in PKCS#7 format

Answers
C.

X. 509 certificate and matching private key from a CA

C.

X. 509 certificate and matching private key from a CA

Answers
D.

self-signed certificate in PKCS#12 format

D.

self-signed certificate in PKCS#12 format

Answers
Suggested answer: C

Explanation:

To encrypt SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification, the components that are required are an X.509 certificate and matching private key from a CA. The certificate must be signed by a trusted CA and contain the domain name or IP address of the listener in the Subject or Subject Alternative Name fields. The private key must be unencrypted and match the certificate. Reference: [Cisco Secure Email Gateway Administrator Guide - Configuring TLS]

Which content filter condition checks to see if the "From: header" in the message is similar to any of the users in the content dictionary?

A.

Forged Email Detection

A.

Forged Email Detection

Answers
B.

SPF Verification

B.

SPF Verification

Answers
C.

Subject Header

C.

Subject Header

Answers
D.

Duplicate Boundaries Verification

D.

Duplicate Boundaries Verification

Answers
Suggested answer: A

Explanation:

The content filter condition that checks to see if the "From: header" in the message is similar to any of the users in the content dictionary is Forged Email Detection. This condition compares the sender's name or email address with a list of names or email addresses in a content dictionary and triggers an action if they match or are similar. Reference: [Cisco Secure Email Gateway Administrator Guide - Forged Email Detection]

An engineer must provide differentiated email filtering to executives within the organization Which two actions must be taken to accomplish this task? (Choose two)

A.

Define an LDAP group query to specify users to whom the mail policy rules apply.

A.

Define an LDAP group query to specify users to whom the mail policy rules apply.

Answers
B.

Create content filters for actions to take on messages that contain specific data

B.

Create content filters for actions to take on messages that contain specific data

Answers
C.

Upload a csv file containing the email addresses for the users for whom you want to create mail policies.

C.

Upload a csv file containing the email addresses for the users for whom you want to create mail policies.

Answers
D.

Enable the content-scanning features you want to use with mail policies

D.

Enable the content-scanning features you want to use with mail policies

Answers
E.

Define the default mail policies for incoming or outgoing messages

E.

Define the default mail policies for incoming or outgoing messages

Answers
Suggested answer: A, B

Explanation:

Define an LDAP group query to specify users to whom the mail policy rules apply. This way, you can create a custom group of executive users and apply different mail policies to them based on their LDAP attributes[4, p. 2].

Create content filters for actions to take on messages that contain specific data. Content filters allow you to scan the message body and attachments for keywords, phrases, or patterns that match your criteria and perform actions such as quarantine, encrypt, or drop the message[4, p. 7].

The other options are not valid because:

C. Uploading a csv file containing the email addresses for the users for whom you want to create mail policies is not a supported feature of Cisco Secure Email1.

D. Enabling the content-scanning features you want to use with mail policies is not necessary, as content scanning is enabled by default for all incoming and outgoing messages[4, p. 6].

E. Defining the default mail policies for incoming or outgoing messages is not sufficient, as default mail policies apply to all users and do not allow for differentiation based on user groups[4, p. 2].

Total 148 questions
Go to page: of 15