cisco 300-720 practice test

Exam Title: securing email with cisco email security appliance (300-720 sesa)

Last update: Jul 09 ,2025
Question 1

An administrator needs to configure Cisco ESA to ensure that emails are sent and authorized by the owner of the domain. Which two steps must be performed to accomplish this task? (Choose two.)

  • A. Generate keys.
  • B. Create signing profile.
  • C. Create Mx record.
  • D. Enable SPF verification.
  • E. Create DMARC profile.
Answer:

de

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 2

Spreadsheets containing credit card numbers are being allowed to bypass the Cisco ESA.

Which outgoing mail policy feature should be configured to catch this content before it leaves the network?

  • A. file reputation filtering
  • B. outbreak filtering
  • C. data loss prevention
  • D. file analysis
Answer:

b

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

Which feature must be activated on a Cisco ESA to combat backscatter?

  • A. Graymail Detection
  • B. Bounce Profile
  • C. Forged Email Detection
  • D. Bounce Verification
Answer:

d

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Cisco ESA should be used to achieve this?

  • A. incoming mail policies
  • B. safelist
  • C. blocklist
  • D. S/MIME Sending Profile
Answer:

a

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Which two components must be configured to perform DLP scanning? (Choose two.)

  • A. Add a DLP policy on the Incoming Mail Policy.
  • B. Add a DLP policy to the DLP Policy Manager.
  • C. Enable a DLP policy on the Outgoing Mail Policy.
  • D. Enable a DLP policy on the DLP Policy Customizations.
  • E. Add a DLP policy to the Outgoing Content Filter.
Answer:

bc


Reference:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-1/user_guide/b_ESA_Admin_Guide_11_1/b_ESA_Admin_Guide_chapter_010001.html

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 6

Which two action types are performed by Cisco ESA message filters? (Choose two.)

  • A. non-final actions
  • B. filter actions
  • C. discard actions
  • D. final actions
  • E. quarantine actions
Answer:

ad


Reference:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-1/user_guide/b_ESA_Admin_Guide_11_1/b_ESA_Admin_Guide_chapter_01000.html

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 7

A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.

What is the reason of this?

  • A. The From header is checked against all policies in a top-down fashion.
  • B. The message header with the highest priority is checked against each policy in a top-down fashion.
  • C. The To header is checked against all policies in a top-down fashion.
  • D. The message header with the highest priority is checked against the Default policy in a top-down fashion.
Answer:

d

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Which setting affects the aggressiveness of spam detection?

  • A. protection level
  • B. spam threshold
  • C. spam timeout
  • D. maximum depth of recursion scan
Answer:

b


Reference:
https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118220-technote-esa-00.html

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

An engineer is reviewing the SMTP routing table on a Cisco ESA using the smtproutes CLI command and discovers an IPv6 route for 2620:104:4360:9232::23. What type of IPv6 route does this represent?

  • A. Network route
  • B. Subnet route
  • C. Device route
  • D. Prefix route
Answer:

c

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

An organization has a strict policy on URLs embedded in emails. The policy allows visibility into what the URL is but does not allow the user to click it. Which action must be taken to meet the requirements of the security policy?

  • A. Defang the URL.
  • B. Enable the URL quarantine policy.
  • C. Replace the URL with text.
  • D. Redirect the URL to the Cisco security proxy.
Answer:

d

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 15
Viewing questions 1-10 out of 141
Go To
page 2