ExamGecko
Home / Cisco / 300-720 / List of questions
Ask Question

Cisco 300-720 Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report
Export
Collapse

Cisco 300-720 image Question 11 114381 10102024232745000000

Refer to the exhibit. What is the correct order of commands to set filter 2 to active?

filters-> edit-> 2-> Active

filters-> edit-> 2-> Active

filters-> modify-> All-> Active

filters-> modify-> All-> Active

filters-> detail-> 2-> 1

filters-> detail-> 2-> 1

filters-> set-> 2-> 1

filters-> set-> 2-> 1

Suggested answer: D

Explanation:

The correct order of commands to set filter 2 to active on the CLI of Cisco ESA is:

filters, which enters the message filter mode.

set, which sets the status of one or more message filters.

2, which specifies the message filter number.

1, which sets the status of message filter 2 to active.

The other options are not valid orders of commands to set filter 2 to active on the CLI of Cisco ESA, because they use incorrect commands or parameters.

Reference: User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway, page A-6 and page A-7.

asked 10/10/2024
Mark Anthony Acorda
36 questions

Question 12

Report
Export
Collapse

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry "550 Too many invalid recipients | Connection closed by foreign host." Which feature must be used to address this?

DHAP

DHAP

SBRS

SBRS

LDAP

LDAP

SMTP

SMTP

Suggested answer: A

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_011010.html DHAP (Directory Harvest Attack Prevention) is a feature that must be used to address this issue.

DHAP is a mechanism that allows Cisco ESA to prevent directory harvest attacks, which are attempts by spammers or hackers to obtain valid email addresses from an LDAP server by sending messages with random or guessed recipients and checking for bounce messages.

To enable DHAP on Cisco ESA, the network administrator can follow these steps:

Select Network > Listeners and click Edit Settings for the listener that receives incoming messages.

Under SMTP Authentication Settings, select Enable Directory Harvest Attack Prevention.

Enter a value for Maximum Invalid Recipients per Hour, which is the number of invalid recipients that triggers DHAP.

Enter a value for Block Sender for (hours), which is the duration that Cisco ESA blocks messages from senders who exceed the maximum invalid recipients per hour.

Click Submit.

asked 10/10/2024
Mark David
44 questions

Question 13

Report
Export
Collapse

Cisco 300-720 image Question 13 114383 10102024232745000000

Cisco 300-720 image Question 13 114383 10102024232745000000

Refer to the exhibits. What must be done to enforce end user authentication before accessing quarantine?

Enable SPAM notification and use LDAP for authentication.

Enable SPAM notification and use LDAP for authentication.

Enable SPAM Quarantine Notification and add the %quarantine_url% variable.

Enable SPAM Quarantine Notification and add the %quarantine_url% variable.

Change the end user quarantine access from None authentication to SAAS.

Change the end user quarantine access from None authentication to SAAS.

Change the end user quarantine access setting from None authentication to Mailbox.

Change the end user quarantine access setting from None authentication to Mailbox.

Suggested answer: D

Explanation:

Reference: https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118692-configure-esa-00.html#anc7

Changing the end user quarantine access setting from None authentication to Mailbox is the correct way to enforce end user authentication before accessing quarantine. This setting requires the end users to enter their email address and password in order to access their personal quarantine on the Cisco ESA.

The other options are not valid ways to enforce end user authentication before accessing quarantine, because they do not affect the end user quarantine access setting.

Reference: User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway, page 10-2 and page 10-3.

asked 10/10/2024
Sanjiv Cumar
38 questions

Question 14

Report
Export
Collapse

An engineer is configuring a Cisco ESA for the first time and needs to ensure that any email traffic coming from the internal SMTP servers is relayed out through the Cisco ESA and is tied to the Outgoing Mail Policies.

Which Mail Flow Policy setting should be modified to accomplish this goal?

Exception List

Exception List

Connection Behavior

Connection Behavior

Bounce Detection Signing

Bounce Detection Signing

Reverse Connection Verification

Reverse Connection Verification

Suggested answer: B

Explanation:

Reference: https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118136-qanda-esa-00.html

Connection Behavior setting allows you to specify how the Cisco Email Security Appliance (ESA) handles incoming connections from different sender groups. You can choose from four different settings:

Accept: The ESA accepts all connections from the sender group and applies the mail flow policy settings to the messages.

Throttle: The ESA limits the number of concurrent connections and messages per connection from the sender group. This can help reduce the impact of spam or malicious traffic on the ESA's performance.

Reject: The ESA rejects all connections from the sender group and returns a 5xx SMTP error code to the sender. This can help block unwanted or abusive senders from reaching your network.

Test: The ESA accepts connections from the sender group but does not deliver the messages to the recipients. Instead, it logs the messages and marks them as test messages. This can help you test the mail flow policy settings before applying them to real traffic.

To modify the Connection Behavior setting for a sender group, you need to do the following steps:

On the ESA, choose Mail Policies > HAT Overview.

Click Edit Settings for the sender group that you want to modify.

In the Mail Flow Policy Settings section, choose one of the options from the Connection Behavior drop-down list.

Click Submit and commit changes.

asked 10/10/2024
Edgar Zapico
39 questions

Question 15

Report
Export
Collapse

An organization wants to use its existing Cisco ESA to host a new domain and enforce a separate corporate policy for that domain.

What should be done on the Cisco ESA to achieve this?

Use the smtproutes command to configure a SMTP route for the new domain.

Use the smtproutes command to configure a SMTP route for the new domain.

Use the deli very config command to configure mail delivery for the new domain.

Use the deli very config command to configure mail delivery for the new domain.

Use the dsestconf command to add a separate destination for the new domain.

Use the dsestconf command to add a separate destination for the new domain.

Use the altrchost command to add a separate gateway for the new domain.

Use the altrchost command to add a separate gateway for the new domain.

Suggested answer: A

Explanation:

Reference:

https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_011001.html one of the steps to accept mail for additional internal domains on the Cisco ESA is to choose Network > SMTP Routes and enter the new domain and the corresponding destination host IP address1. This can also be done using the smtproutes command in the CLI1. The other commands (deliveryconfig, dsestconf, and altrchost) are not related to this task.

asked 10/10/2024
Isaac Olanrewaju
36 questions

Question 16

Report
Export
Collapse

An engineer is configuring an SMTP authentication profile on a Cisco ESA which requires certificate verification.

Which section must be configured to accomplish this goal?

Mail Flow Policies

Mail Flow Policies

Sending Profiles

Sending Profiles

Outgoing Mail Policies

Outgoing Mail Policies

Verification Profiles

Verification Profiles

Suggested answer: A
asked 10/10/2024
SIDDIQI TARMIM
38 questions

Question 17

Report
Export
Collapse

Which SMTP extension does Cisco ESA support for email security?

ETRN

ETRN

UTF8SMTP

UTF8SMTP

PIPELINING

PIPELINING

STARTTLS

STARTTLS

Suggested answer: D

Explanation:

STARTTLS is an SMTP extension that allows email servers to negotiate a secure connection using TLS or SSL encryption. Cisco ESA supports STARTTLS for both inbound and outbound email delivery.

Reference: User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway, page 5-2.

Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_011000.html

asked 10/10/2024
Aline Oliveira
40 questions

Question 18

Report
Export
Collapse

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

SenderBase Reputation Filtering

SenderBase Reputation Filtering

Connection Reputation Filtering

Connection Reputation Filtering

Talos Reputation Filtering

Talos Reputation Filtering

SpamCop Reputation Filtering

SpamCop Reputation Filtering

Suggested answer: A

Explanation:

SenderBase Reputation Filtering is a feature that allows Cisco ESA to reject or throttle connections from email servers based on their reputation score, which is calculated by Talos using sensor information from various sources.

Reference: User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway, page 6-2.

asked 10/10/2024
matthew kim
40 questions

Question 19

Report
Export
Collapse

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

Enabling the End-User Safelist/Blocklist feature

Enabling the End-User Safelist/Blocklist feature

Spam Quarantine External Authentication Query

Spam Quarantine External Authentication Query

Spam Quarantine End-User Authentication Query

Spam Quarantine End-User Authentication Query

Spam Quarantine Alias Consolidation Query

Spam Quarantine Alias Consolidation Query

Suggested answer: C

Explanation:

Spam Quarantine End-User Authentication Query is a query that Cisco ESA performs against an LDAP server to validate the end-user credentials during login to the End-User Quarantine.

Reference: User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway, page 10-9.

Reference: https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118692-configure- esa-00.html

asked 10/10/2024
Christian Gyssels
38 questions

Question 20

Report
Export
Collapse

Which benefit does enabling external spam quarantine on Cisco SMA provide?

ability to back up spam quarantine from multiple Cisco ESAs to one central console

ability to back up spam quarantine from multiple Cisco ESAs to one central console

access to the spam quarantine interface on which a user can release, duplicate, or delete

access to the spam quarantine interface on which a user can release, duplicate, or delete

ability to scan messages by using two engines to increase a catch rate

ability to scan messages by using two engines to increase a catch rate

ability to consolidate spam quarantine data from multiple Cisco ESA to one central console

ability to consolidate spam quarantine data from multiple Cisco ESA to one central console

Suggested answer: D

Explanation:

External spam quarantine is a feature that allows Cisco SMA to store and manage spam messages quarantined by multiple Cisco ESAs in one central location, providing a unified view and administration of the spam quarantine data.

Reference: User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway, page 10-3.

Reference: https://www.cisco.com/c/en/us/td/docs/security/security_management/sma/sma11-0/user_guide/ b_SMA_Admin_Guide/b_SMA_Admin_Guide_chapter_010101.html

asked 10/10/2024
Kees den Dekker
43 questions
Total 148 questions
Go to page: of 15
Search

Related questions