Pre-Summer Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Questions 4

Which of the following two statements are correct about the large file attachments (greater than 25MB) feature in Cisco Secure Email Encryption Service? (Choose two.)

Options:

A.

Large file attachments can only be sent using the websafe portal

B.

This feature allows users to send up to 50MB of attachments in a secure email.

C.

Large file attachments will be sent as a securedoc attachment

D.

Large file attachments can only be sent using the Cisco Secure Email Add-In.

E.

This feature can only be enabled if the Read from Message feature is enabled

Buy Now
Questions 5

An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)

Options:

A.

domains

B.

senders

C.

reputation score

D.

receivers

E.

spf check

Buy Now
Questions 6

What is the default behavior of any listener for TLS communication?

Options:

A.

preferred-verify

B.

off

C.

preferred

D.

required

Buy Now
Questions 7

An engineer wants to utilize a digital signature in outgoing emails to validate to others that the email they are receiving was indeed sent and authorized by the owner of that domain Which two components should be configured on the Cisco Secure Email Gateway appliance to achieve this? (Choose two.)

Options:

A.

DMARC verification profile

B.

SPF record

C.

Public/Private keypair

D.

Domain signing profile

E.

PKI certificate

Buy Now
Questions 8

Refer to the exhibit. A security engineer must configure a Cisco Secure Email Gateway to ensure that encryption is enabled and the configured profile is provisioned. Which command must be used?

Options:

A.

setup

B.

check encryption

C.

provision

D.

profiles

Buy Now
Questions 9

An engineer must enable SIDF for a mail flow policy on an incoming listener in Cisco Secure Email Gateway. Drag and drop the actions from the left into the sequence on the right to meet the requirement.

Options:

Buy Now
Questions 10

A network administrator enabled McAfee antivirus scanning on a Cisco Secure Email Gateway and configured the virus scanning action of " scan for viruses only " If the scanner finds a virus in an attachment for an incoming email, what action will be applied to this message?

Options:

A.

The email and attachment are forwarded to the network administrator.

B.

No repair is attempted, and the attachment is either dropped or delivered

C.

The attachment is dropped and replaced with a " Removed Attachment " file

D.

The system will attempt to repair the attachment

Buy Now
Questions 11

Which global setting is configured under Cisco ESA Scan Behavior?

Options:

A.

minimum attachment size to scan

B.

attachment scanning timeout

C.

actions for unscannable messages due to attachment type

D.

minimum depth of attachment recursion to scan

Buy Now
Questions 12

Which two query types are available when an LDAP profile is configured? (Choose two.)

Options:

A.

proxy consolidation

B.

user

C.

recursive

D.

group

E.

routing

Buy Now
Questions 13

Refer to the exhibit. How does a Cisco Secure Email Gateway handle an email that is identified both as spam positive and outbreak positive by outbreak filters?

Options:

A.

The email is sent to outbreak quarantine and is rescanned for spam before being released.

B.

The email is sent only to the outbreak quarantine.

C.

The email is sent to spam quarantine and outbreak quarantine.

D.

The email is sent only to the spam quarantine.

Buy Now
Questions 14

An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?

Options:

A.

Configure the outbound firewall rule to permit traffic on port 8081

B.

Enable the Use HTTP option under Advanced Settings for File Reputation.

C.

Enable the Use SSL option under Advanced Settings for File Reputation.

D.

Configure the outbound firewall rule to permit traffic on port 3237

E.

TP/HTTPS ports outbound and notices that the AMP file reputation

Buy Now
Questions 15

An engineer must implement policies in Cisco Secure Email Gateway to prevent suspicious spam messages from being delivered to executives group. Messages that arrive from public email addresses from the yahoo.com or gmail.com domains must be redirected to the IT department. Which two configuration actions must be taken to meet the requirement? (Choose two.)

Options:

A.

Add a mail policy to match the sender domains as @ yahoo com and @ gmail com.

B.

Configure the policy to match executive recipients either via email address or LDAP group.

C.

Implement a mail policy to match the sender domains as recipients as ©executives.com.

D.

Set up a mail policy to match the sender domains as senders as ' yahoo com and *gmail.com

E.

Apply a mail policy to match the sender domains as senders not as ©executives com.

Buy Now
Questions 16

When DKIM signing is configured, which DNS record must be updated to load the DKIM public signing key?

Options:

A.

AAAA record

B.

PTR record

C.

TXT record

D.

MX record

Buy Now
Questions 17

Which benefit does enabling external spam quarantine on Cisco SMA provide?

Options:

A.

ability to back up spam quarantine from multiple Cisco ESAs to one central console

B.

access to the spam quarantine interface on which a user can release, duplicate, or delete

C.

ability to scan messages by using two engines to increase a catch rate

D.

ability to consolidate spam quarantine data from multiple Cisco ESA to one central console

Buy Now
Questions 18

Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?

Options:

A.

Add an additional mapping for attachment type for zip files.

B.

Enable assume match pattern if the email was not scanned for any reason.

C.

Increase the maximum recursion depth from 5 to a larger value.

D.

Increase the maximum attachment size to scan to a larger value.

Buy Now
Questions 19

An email administrator must configure DLP policies on the Cisco Secure Email Gateway. The DLP policies must be added to the default outgoing mail policy. How is this task accomplished?

Options:

A.

Create a recipient group for the DLP policies and apply it to the default outgoing mail policy.

B.

Remove DLP policies with the same severity level prior to leveraging the DLP Assessment Wizard

C.

Create a classifier to match specific content within a predefined DLP policy template

D.

Remove all existing DLP policies prior to leveraging the DLP Assessment Wizard.

Buy Now
Questions 20

Which content filter condition checks to see if the " From: header " in the message is similar to any of the users in the content dictionary?

Options:

A.

Forged Email Detection

B.

SPF Verification

C.

Subject Header

D.

Duplicate Boundaries Verification

Buy Now
Questions 21

What occurs when configuring separate incoming mail policies?

Options:

A.

message splintering

B.

message exceptions

C.

message detachment

D.

message aggregation

Buy Now
Questions 22

An admin istrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.

How is this accomplished?

Options:

A.

Disable the VOF feature before sending SPAM to the external quarantine.

B.

Configure a mail p olicy to determine whether the message is sent to the local or external quarantine.

C.

Disable the local quarantine before sending SPAM to the external quarantine.

D.

Configure a user policy to determine whether the message is sent to the local or exte rnal quarantine.

Buy Now
Questions 23

An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)

An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)

Options:

Buy Now
Questions 24

What is the order of virus scanning when multilayer antivirus scanning is configured?

Options:

A.

The default engine scans for viruses first and the McAfee engine scans for viruses second.

B.

The Sophos engine scans for viruses first and the McAfee engine scans for viruses second.

C.

The McAfee engine scans for viruses first and the default engine scans for viruses second.

D.

The McAfee engine scans for viruses first and the Sophos engine scans for viruses second.

Buy Now
Questions 25

Which type of DNS record would contain the following line, which references the DKIM public key per RFC 6376?

v=DKIM1; p=76E629F05F709EF665853333EEC3F5ADE69A2362BECE406582670456943283BE

Options:

A.

CNAME

B.

AAAA

C.

TXT

D.

PTR

Buy Now
Questions 26

Which type of attack is prevented by configuring file reputation filtering and file analysis features?

Options:

A.

denial of service

B.

zero-day

C.

backscatter

D.

phishing

Buy Now
Questions 27

What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?

Options:

A.

provisioned email encryption profile

B.

message encryption from a content filter that select " Message Encryption " over TLS

C.

message encryption from the mail flow policies with " CRES " selected

D.

content filter to forward the email to the Cisco Registered Envelope server

Buy Now
Questions 28

Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)

Options:

A.

Paste in the Registration Token generated from the Smart Licensing Account

B.

Enable the Threat Response service under Network > Cloud Service Settings.

C.

Select the correct Threat Response Server based on your region.

D.

Paste in the Registration Token generated from the Security Services Exchange.

E.

Enable the Security Services Exchange service under Network > Cloud Service Settings

Buy Now
Questions 29

Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?

Options:

A.

traffic between the Cisco Secure Email Gateway and the LDAP server

B.

emails being delivered from the Cisco Secure Email Gateway

C.

HTTPS traffic when connecting to the web user interface of the Cisco Secure Email Gateway

D.

emails being received by the Cisco Secure Email Gateway

Buy Now
Questions 30

Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.)

Options:

A.

The filters command executed from the CLI is used to configure the message filters.

B.

Message filters configuration within the web user interface is located within Incoming Content Filters.

C.

The filterconfig command executed from the CLI is used to configure message filters.

D.

Message filters can be configured only from the CLI.

E.

Message filters can be configured only from the web user interface.

Buy Now
Questions 31

When URL logging is configured on a Cisco ESA, which feature must be enabled first?

Options:

A.

antivirus

B.

antispam

C.

virus outbreak filter

D.

senderbase reputation filter

Buy Now
Questions 32

Which two components must be configured to perform DLP scanning? (Choose two.)

Options:

A.

Add a DLP policy on the Incoming Mail Policy.

B.

Add a DLP policy to the DLP Policy Manager.

C.

Enable a DLP policy on the Outgoing Mail Policy.

D.

Enable a DLP policy on the DLP Policy Customizations.

E.

Add a DLP policy to the Outgoing Content Filter.

Buy Now
Questions 33

Which attack is mitigated by using Bounce Verification?

Options:

A.

spoof

B.

denial of service

C.

eavesdropping

D.

smurf

Buy Now
Questions 34

Users have been complaining of a higher volume of emails containing profanity. The network administrator will need to leverage dictionaries and create specific conditions to reduce the number of inappropriate emails.

Which two filters should be configured to a ddress this? (Choose two.)

Options:

A.

message

B.

spam

C.

VOF

D.

sender group

E.

content

Buy Now
Questions 35

What is a valid content filter action?

Options:

A.

decrypt on delivery

B.

quarantine

C.

skip antispam

D.

archive

Buy Now
Questions 36

An engineer must add the user1@cisco.co m with an IP address of 10.1.1.13 to a safelist in Cisco Secure Email Gateway. Which two safelist syntaxes must be configured to meet the requirement? (Choose two.)

Options:

A.

[10.1.1.16/30]

B.

user1@ [10.1.1.13]

C.

[10.1.1.0/24]

D.

[10.1.1.13/30]

Buy Now
Questions 37

What is a benefit of implementing URL filtering on the Cisco ESA?

Options:

A.

removes threats from malicious URLs

B.

blacklists spam

C.

provides URL reputation protection

D.

enhances reputation against malicious URLs

Buy Now
Questions 38

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

Options:

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Buy Now
Questions 39

An engineer must configure the message source when integrating Cisco Secure Email Threat Defense with Microsoft 365. The integration must allow visibility but not remediation. Drag and drop the actions from the left into sequence on the right to meet the requirement.

Options:

Buy Now
Questions 40

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?

Options:

A.

Enable the DKIM service checker

B.

Export the DNS TXT record to provide to the DNS registrar

C.

Import the DNS record of the service provider into the Cisco Secure Email Gateway.

D.

Configure the Trusted Sender Group message authenticity policy.

Buy Now
Questions 41

Which two factors must be considered when message filter processing is configured? (Choose two.)

Options:

A.

message-filter order

B.

lateral processing

C.

structure of the combined packet

D.

mail policies

E.

MIME structure of the message

Buy Now
Questions 42

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Buy Now
Questions 43

An engineer must share threat reporting information from Cisco Secure Email Gateway to Cisco SecureX. Which setting must be enabled in Secure Email Gateway?

Options:

A.

SNMP

B.

Security Services Exchange

C.

Cloud Service Settings

D.

System Monitor

Buy Now
Questions 44

What is needed to sign outbound emails using Domain Keys Identified Mail after a signing profile is created in the Cisco Secure Email Gateway?

Options:

A.

Configure in destination controls.

B.

Enable DKIM in an outbound content filter.

C.

Enable DKIM in the mail flow policy.

D.

A signing profile referencing the sender domain is sufficient.

Buy Now
Questions 45

The security administrator wants to configure alerts on Cisco Secure Email Gateway for outbreak filters. Which two actions must be taken to meet the requirement? (Choose two.)

Options:

A.

From Outbreak Filters Global Settings, enable the alerts for the outbreak filters.

B.

Enable the alerts for the outbreak filters by using an Adaptive Rule.

C.

From Mail Policies, configure the Outbreak Filters settings.

D.

From System Administration enable message splintering.

E.

From Security Services, configure the Outbreak Filters settings.

Buy Now
Questions 46

An engineer must configure a virtual gateway on a Cisco Secure Email Gateway to send email for a group named Grouplnt. Grouplnt is part of these domains:

•domain 1 -lab

•domain2.lab

Drag and drop the code snippets from the right onto the boxes to configure the virtual gateway. Not all options are used.

Options:

Buy Now
Questions 47

Refer to the exhibit. A security engineer must create a message filter on a Cisco Secure Email Gateway to scan all incoming emails for encrypted PDF files. Which code snippet completes the message filter?

Options:

A.

attachment

B.

attachment-binary-include

C.

attachment-binary-contains

D.

attachment-binary-file

Buy Now
Questions 48

An engineer must configure an incoming antispam mail policy in Cisco Secure Email Gateway for IT users. The solution must meet these requirements: •The policy must be editable only by administrators.

•The policy must be activated for all incoming emails that are destined for admin@cisco.com .

These configurations have been performed already:

•Create an incoming mail policy.

•Set the name and the role to admin.

•Activate the antispam security service.

Which two additional actions must be taken to complete the configuration? (Choose two.)

Options:

A.

Configure the senders for the policy to any Sender.

B.

Set Following Recipients to admin@.cisco com.

C.

Set Following Recipients to admin@cisco.com.

D.

Enable Following Senders to admm@cisco.com.

E.

Configure the recipients for the policy to any Recipient.

Buy Now
Questions 49

Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)

Options:

A.

accept

B.

relay

C.

delay

D.

route

E.

reject

Buy Now
Questions 50

What is the maximum message size that can be configured for encryption on the Cisco ESA?

Options:

A.

20 MB

B.

25 MB

C.

15 MB

D.

30 MB

Buy Now
Questions 51

An administrator has cr eated a content filter to quarantine all messages that result in an SPF hardfail to review the messages and determine whether a trusted partner has accidentally misconfigured the DNS settings. The administrator sets the policy quarantine to release the mes sages after 24 hours, allowing time to review while not interrupting business.

Which additional option should be used to help the end users be aware of the elevated risk of interacting with these messages?

Options:

A.

Notify Recipient

B.

Strip Attachments

C.

Notify Sender

D.

Modify Subject

Buy Now
Questions 52

Which suboption must be selected when LDAP is configured for Spam Quarantine End-User Authentication?

Options:

A.

Designate as the active query

B.

Update Frequency

C.

Server Priority

D.

Entity ID

Buy Now
Questions 53

What is a category for classifying graymail?

Options:

A.

Malicious

B.

Marketing

C.

Spam

D.

Priority

Buy Now
Questions 54

A network engineer is reviewing the record presented.

Which type of DNS record would contain the record as per the DKIM public key RFC 6376?

Options:

A.

MX

B.

PTR

C.

SRV

D.

TXT

Buy Now
Questions 55

An engineer must configure Directory Harvest Attack Prevention for SMTP in Cisco Secure Email Gateway. This error message must be sent when the listener receives more than 50 invalid

recipients per hour.

•500 - Too many requests

•Max. Invalid Recipients Per Hour was set to 50 already.

Which two actions must be taken next to set maximum invalid recipients per hour to meet the requirement? (Choose two.)

Options:

A.

Create Max. Recipients Per Hour Code to 500.

B.

Apply Max. Recipients Per Hour Text to 500 - Too many requests.

C.

Configure Max. Recipients Per Hour Code to 500.

D.

Set Max. Recipients Per Hour Text to Too many requests.

E.

Implement Max. Recipients Per Hour Text to 500 - Too many requests.

Buy Now
Questions 56

An engineer is configuring a Cisco Secure Email Gateway and needs to reject email messages to a recipient with email address user0516585210@acme.com . Which list contains the allowed recipient addresses?

Options:

A.

BAT

B.

HAT

C.

SAT

D.

RAT

Buy Now
Questions 57

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

Options:

A.

DHAP

B.

SBRS

C.

LDAP

D.

SMTP

Buy Now
Exam Code: 300-720
Exam Name: Securing Email with Cisco Email Security Appliance (300-720 SESA)
Last Update: May 10, 2026
Questions: 190
300-720 pdf

300-720 PDF

$28.5  $94.99
300-720 Engine

300-720 Testing Engine

$33  $109.99
300-720 PDF + Engine

300-720 PDF + Testing Engine

$43.5  $144.99