Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Questions 4

An engineer wants to utilize a digital signature in outgoing emails to validate to others that the email they are receiving was indeed sent and authorized by the owner of that domain Which two components should be configured on the Cisco Secure Email Gateway appliance to achieve this? (Choose two.)

Options:

A.

DMARC verification profile

B.

SPF record

C.

Public/Private keypair

D.

Domain signing profile

E.

PKI certificate

Buy Now
Questions 5

What is the purpose of Cisco Email Encryption on Cisco ESA?

Options:

A.

to ensure anonymity between a recipient and MTA

B.

to ensure integrity between a sender and MTA

C.

to authenticate direct communication between a sender and Cisco ESA

D.

to ensure privacy between Cisco ESA and MTA

Buy Now
Questions 6

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: must be entered. What must be added to the dictionary to accomplish this goal?

Options:

A.

example.com

B.

Example CEO

C.

ceo

D.

ceo@example com

Buy Now
Questions 7

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

Options:

A.

default

B.

system

C.

user

D.

custom

E.

demo

Buy Now
Questions 8

What is the order of virus scanning when multilayer antivirus scanning is configured?

Options:

A.

The default engine scans for viruses first and the McAfee engine scans for viruses second.

B.

The Sophos engine scans for viruses first and the McAfee engine scans for viruses second.

C.

The McAfee engine scans for viruses first and the default engine scans for viruses second.

D.

The McAfee engine scans for viruses first and the Sophos engine scans for viruses second.

Buy Now
Questions 9

A list of company executives is routinely being spoofed, which puts the company at risk of malicious email attacks An administrator must ensure that executive messages are originating from legitimate sending addresses Which two steps must be taken to accomplish this task? (Choose two.)

Options:

A.

Create an incoming content filter with SPF detection.

B.

Enable the Forged Email Detection feature under Security Settings.

C.

Enable DMARC feature under Mail Policies.

D.

Create an incoming content filter with the Forged Email Detection condition

E.

Create a content dictionary including a list of the names that are being spoofed.

Buy Now
Questions 10

An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Cisco ESA should be used to achieve this?

Options:

A.

incoming mail policies

B.

safelist

C.

blocklist

D.

S/MIME Sending Profile

Buy Now
Questions 11

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

Options:

A.

default

B.

system

C.

user

D.

custom

E.

demo

Buy Now
Questions 12

An administrator notices that the Cisco Secure Email Gateway delivery queue on an appliance is consistently full. After further investigation, it is determined that the IP addresses currently in use by appliance are being rate-limited by some destinations. The administrator creates a new interface with an additional IP address using virtual gateway technology, but the issue is not solved Which configuration change resolves the issue?

Options:

A.

Use the CLI command altsrchost to set the new interface as the source IP address for all mail.

B.

Use the CLI command loadbalance auto to enable mail delivery over all interfaces.

C.

Use the CLI command alt-src-host to set the new interface as a possible delivery candidate.

D.

Use the CLI command deliveryconfig to set the new interface as the primary interface for mail delivery

Buy Now
Questions 13

An administrator notices that incoming emails with certain attachments do not get delivered to all recipients when the emails have multiple recipients in different domains like cisco.com and test.com. The same emails when sent only to recipients in cisco.com are delivered properly. How must the Cisco Secure Email Gateway be configured to avoid this behavior?

Options:

A.

Modify mail policies for cisco.com to ensure that emails are not dropped.

B.

Modify mail policies so email recipients do not match multiple policies.

C.

Modify DLP configuration to ensure that all attachments are permitted for test.com.

D.

Modify DLP configuration to exempt DLP scanning for messages sent to test.com domain

Buy Now
Questions 14

How does the graymail safe unsubscribe feature function?

Options:

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Buy Now
Questions 15

An engineer is tasked with creating a content filter to catch attachments, including credit card numbers, and hold them for review until further action is taken. Which component on a Cisco Secure Email Gateway must be configured to meet this requirement?

Options:

A.

Spam Quarantine

B.

Policy Quarantine

C.

Outbreak Filter

D.

Content Filter

Buy Now
Questions 16

Drag and drop the graymail descriptions from the left onto the verdict categories they belong to on the right.

Options:

Buy Now
Questions 17

Which setting affects the aggressiveness of spam detection?

Options:

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Buy Now
Questions 18

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

Options:

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Buy Now
Questions 19

A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?

Options:

A.

Non-Viral threat detection requires Antivirus or AMP enablement to properly function

B.

The Outbreak Filters option Graymail Header must be enabled

C.

Non-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function.

D.

The Outbreak Filters option URL Rewriting must be enabled.

Buy Now
Questions 20

An Encryption Profile has been set up on the Cisco ESA.

Drag and drop the steps from the left for creating an outgoing content filter to encrypt emails that contains the subject "Secure:" into the correct order on the right.

Options:

Buy Now
Questions 21

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

Options:

A.

message-ID

B.

sender

C.

URL reputation

D.

from

E.

mail-from

Buy Now
Questions 22

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)

Options:

A.

DKIM

B.

Public Keys

C.

Domain Keys

D.

Symmetric Keys

E.

Private Keys

Buy Now
Questions 23

An organization wants to use its existing Cisco ESA to host a new domain and enforce a separate corporate policy for that domain.

What should be done on the Cisco ESA to achieve this?

Options:

A.

Use the smtproutes command to configure a SMTP route for the new domain.

B.

Use the deli very config command to configure mail delivery for the new domain.

C.

Use the dsestconf command to add a separate destination for the new domain.

D.

Use the altrchost command to add a separate gateway for the new domain.

Buy Now
Questions 24

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

Options:

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

Buy Now
Questions 25

Which feature must be activated on a Cisco Secure Email Gateway to combat backscatter?

Options:

A.

Graymail Detection

B.

Bounce Verification

C.

Forged Email Detection

D.

Bounce Profile

Buy Now
Questions 26

An administrator must ensure that emails sent from cisco_123@externally.com are routed through an alternate virtual gateway. Drag and drop the snippet from the bottom onto the blank in the graphic to finish the message filter syntax. Not all snippets are used.

Options:

Buy Now
Questions 27

Which setting affects the aggressiveness of spam detection?

Options:

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Buy Now
Questions 28

What is the maximum message size that can be configured for encryption on the Cisco ESA?

Options:

A.

20 MB

B.

25 MB

C.

15 MB

D.

30 MB

Buy Now
Questions 29

An organization wants to prevent proprietary patent documents from being shared externally via email. The network administrator reviewed the DLP policies on the Cisco Secure Email Gateway and could not find an existing policy with the appropriate matching patterns. Which type of DLP policy template must be used to create a policy that meets this requirement?

Options:

A.

privacy protection

B.

custom policy

C.

regulatory compliance

D.

acceptable use

Buy Now
Questions 30

What are organizations trying to address when implementing a SPAM quarantine?

Options:

A.

true positives

B.

false negatives

C.

false positives

D.

true negatives

Buy Now
Questions 31

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?

Options:

A.

Enable the DKIM service checker

B.

Export the DNS TXT record to provide to the DNS registrar

C.

Import the DNS record of the service provider into the Cisco Secure Email Gateway.

D.

Configure the Trusted Sender Group message authenticity policy.

Buy Now
Questions 32

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

Options:

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Buy Now
Questions 33

Which component must be added to the content filter to trigger on failed SPF Verification or DKIM Authentication verdicts?

Options:

A.

status

B.

response

C.

parameter

D.

condition

Buy Now
Questions 34

Email encryption is configured on a Cisco ESA that uses CRES.

Which action is taken on a message when CRES is unavailable?

Options:

A.

It is requeued.

B.

It is sent in clear text.

C.

It is dropped and an error message is sent to the sender.

D.

It is encrypted by a Cisco encryption appliance.

Buy Now
Questions 35

Drag and drop authentication options for End-User Quarantine Access from the left onto the corresponding configuration steps on the right.

Options:

Buy Now
Questions 36

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

Options:

A.

83

B.

82

C.

443

D.

80

Buy Now
Questions 37

The company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data Users must be able to flag the messages that require encryption versus a Cisco Secure Email Gateway appliance scanning all messages and automatically encrypting via detection Which action enables this capability?

Options:

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

Buy Now
Questions 38

Spammers routinely try to send emails with the recipient field filled with a list of all possible combinations of letters and numbers. These combinations, appended with a company domain name are malicious attempts at learning all possible valid email addresses. Which action must be taken on a Cisco Secure Email Gateway to prevent this from occurring?

Options:

A.

Select the SMTP Authentication Query checkbox

B.

Perform LDAP acceptance validation.

C.

Quarantine external authentication queries.

D.

Enable end user safelist features

Buy Now
Questions 39

An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)

Options:

A.

domains

B.

senders

C.

reputation score

D.

receivers

E.

spf check

Buy Now
Questions 40

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: must be entered. What must be added to the dictionary to accomplish this goal?

Options:

A.

example.com

B.

Example CEO

C.

ceo

D.

ceo@example com

Buy Now
Questions 41

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

Options:

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Buy Now
Questions 42

Which two configurations are used on multiple LDAP servers to connect with Cisco ESA? (Choose two.)

Options:

A.

load balancing

B.

SLA monitor

C.

active-standby

D.

failover

E.

active-active

Buy Now
Questions 43

An administrator needs to configure Cisco ESA to ensure that emails are sent and authorized by the owner of the domain. Which two steps must be performed to accomplish this task? (Choose two.)

Options:

A.

Generate keys.

B.

Create signing profile.

C.

Create Mx record.

D.

Enable SPF verification.

E.

Create DMARC profile.

Buy Now
Questions 44

An organization has multiple Cisco Secure Email Gateway appliances deployed, resulting in several spam quarantines to manage. To manage the quarantined messages, the administrator enabled the centralized spam quarantine on the Cisco Secure Email and Web Manager appliance and configured the external spam quarantine on the Cisco Secure Email Gateway appliances. However, messages are still being directed to the local quarantine on the Cisco Secure Email Gateway appliances What change is necessary to complete the configuration?

Options:

A.

Modify the incoming mail policies on the Cisco Secure Email Gateway appliances to redirect to the external quarantine

B.

Disable the external spam quarantine on the Cisco Secure Email Gateway appliances

C.

Disable the local spam quarantine on the Cisco Secure Email Gateway appliances.

D.

Modify the external spam quarantine settings on the Cisco Secure Email Gateway appliances and change the port to 25

Buy Now
Exam Code: 300-720
Exam Name: Securing Email with Cisco Email Security Appliance (300-720 SESA)
Last Update: Jun 15, 2025
Questions: 147
300-720 pdf

300-720 PDF

$33.25  $94.99
300-720 Engine

300-720 Testing Engine

$38.5  $109.99
300-720 PDF + Engine

300-720 PDF + Testing Engine

$50.75  $144.99