cisco 300-720 practice test

securing email with cisco email security appliance (300-720 sesa)

Last exam update: Nov 30 ,2024
Page 1 out of 15. Viewing questions 1-10 out of 141

Question 1

An administrator needs to configure Cisco ESA to ensure that emails are sent and authorized by the owner of the domain. Which two steps must be performed to accomplish this task? (Choose two.)

  • A. Generate keys.
  • B. Create signing profile.
  • C. Create Mx record.
  • D. Enable SPF verification.
  • E. Create DMARC profile.
Answer:

de

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 2

Spreadsheets containing credit card numbers are being allowed to bypass the Cisco ESA.

Which outgoing mail policy feature should be configured to catch this content before it leaves the network?

  • A. file reputation filtering
  • B. outbreak filtering
  • C. data loss prevention
  • D. file analysis
Answer:

b

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which feature must be activated on a Cisco ESA to combat backscatter?

  • A. Graymail Detection
  • B. Bounce Profile
  • C. Forged Email Detection
  • D. Bounce Verification
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Cisco ESA should be used to achieve this?

  • A. incoming mail policies
  • B. safelist
  • C. blocklist
  • D. S/MIME Sending Profile
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which two components must be configured to perform DLP scanning? (Choose two.)

  • A. Add a DLP policy on the Incoming Mail Policy.
  • B. Add a DLP policy to the DLP Policy Manager.
  • C. Enable a DLP policy on the Outgoing Mail Policy.
  • D. Enable a DLP policy on the DLP Policy Customizations.
  • E. Add a DLP policy to the Outgoing Content Filter.
Answer:

bc


Reference:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-1/user_guide/b_ESA_Admin_Guide_11_1/b_ESA_Admin_Guide_chapter_010001.html

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 6

Which two action types are performed by Cisco ESA message filters? (Choose two.)

  • A. non-final actions
  • B. filter actions
  • C. discard actions
  • D. final actions
  • E. quarantine actions
Answer:

ad


Reference:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-1/user_guide/b_ESA_Admin_Guide_11_1/b_ESA_Admin_Guide_chapter_01000.html

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 7

A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.

What is the reason of this?

  • A. The From header is checked against all policies in a top-down fashion.
  • B. The message header with the highest priority is checked against each policy in a top-down fashion.
  • C. The To header is checked against all policies in a top-down fashion.
  • D. The message header with the highest priority is checked against the Default policy in a top-down fashion.
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which setting affects the aggressiveness of spam detection?

  • A. protection level
  • B. spam threshold
  • C. spam timeout
  • D. maximum depth of recursion scan
Answer:

b


Reference:
https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118220-technote-esa-00.html

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

An engineer is reviewing the SMTP routing table on a Cisco ESA using the smtproutes CLI command and discovers an IPv6 route for 2620:104:4360:9232::23. What type of IPv6 route does this represent?

  • A. Network route
  • B. Subnet route
  • C. Device route
  • D. Prefix route
Answer:

c

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

An organization has a strict policy on URLs embedded in emails. The policy allows visibility into what the URL is but does not allow the user to click it. Which action must be taken to meet the requirements of the security policy?

  • A. Defang the URL.
  • B. Enable the URL quarantine policy.
  • C. Replace the URL with text.
  • D. Redirect the URL to the Cisco security proxy.
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2