Which of the following two statements are correct about the large file attachments (greater than 25MB) feature in Cisco Secure Email Encryption Service? (Choose two.)
An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)
An engineer wants to utilize a digital signature in outgoing emails to validate to others that the email they are receiving was indeed sent and authorized by the owner of that domain Which two components should be configured on the Cisco Secure Email Gateway appliance to achieve this? (Choose two.)

Refer to the exhibit. A security engineer must configure a Cisco Secure Email Gateway to ensure that encryption is enabled and the configured profile is provisioned. Which command must be used?
An engineer must enable SIDF for a mail flow policy on an incoming listener in Cisco Secure Email Gateway. Drag and drop the actions from the left into the sequence on the right to meet the requirement.

A network administrator enabled McAfee antivirus scanning on a Cisco Secure Email Gateway and configured the virus scanning action of " scan for viruses only " If the scanner finds a virus in an attachment for an incoming email, what action will be applied to this message?
Which two query types are available when an LDAP profile is configured? (Choose two.)

Refer to the exhibit. How does a Cisco Secure Email Gateway handle an email that is identified both as spam positive and outbreak positive by outbreak filters?
An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?
An engineer must implement policies in Cisco Secure Email Gateway to prevent suspicious spam messages from being delivered to executives group. Messages that arrive from public email addresses from the yahoo.com or gmail.com domains must be redirected to the IT department. Which two configuration actions must be taken to meet the requirement? (Choose two.)
When DKIM signing is configured, which DNS record must be updated to load the DKIM public signing key?


Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?
An email administrator must configure DLP policies on the Cisco Secure Email Gateway. The DLP policies must be added to the default outgoing mail policy. How is this task accomplished?
Which content filter condition checks to see if the " From: header " in the message is similar to any of the users in the content dictionary?
An admin istrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.
How is this accomplished?
An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)
An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)
What is the order of virus scanning when multilayer antivirus scanning is configured?
Which type of DNS record would contain the following line, which references the DKIM public key per RFC 6376?
v=DKIM1; p=76E629F05F709EF665853333EEC3F5ADE69A2362BECE406582670456943283BE
Which type of attack is prevented by configuring file reputation filtering and file analysis features?
What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?
Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)
Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?
Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.)
When URL logging is configured on a Cisco ESA, which feature must be enabled first?
Users have been complaining of a higher volume of emails containing profanity. The network administrator will need to leverage dictionaries and create specific conditions to reduce the number of inappropriate emails.
Which two filters should be configured to a ddress this? (Choose two.)
An engineer must add the user1@cisco.co m with an IP address of 10.1.1.13 to a safelist in Cisco Secure Email Gateway. Which two safelist syntaxes must be configured to meet the requirement? (Choose two.)
Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)
An engineer must configure the message source when integrating Cisco Secure Email Threat Defense with Microsoft 365. The integration must allow visibility but not remediation. Drag and drop the actions from the left into sequence on the right to meet the requirement.

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?
Which two factors must be considered when message filter processing is configured? (Choose two.)
Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?
An engineer must share threat reporting information from Cisco Secure Email Gateway to Cisco SecureX. Which setting must be enabled in Secure Email Gateway?
What is needed to sign outbound emails using Domain Keys Identified Mail after a signing profile is created in the Cisco Secure Email Gateway?
The security administrator wants to configure alerts on Cisco Secure Email Gateway for outbreak filters. Which two actions must be taken to meet the requirement? (Choose two.)
An engineer must configure a virtual gateway on a Cisco Secure Email Gateway to send email for a group named Grouplnt. Grouplnt is part of these domains:
•domain 1 -lab
•domain2.lab
Drag and drop the code snippets from the right onto the boxes to configure the virtual gateway. Not all options are used.


Refer to the exhibit. A security engineer must create a message filter on a Cisco Secure Email Gateway to scan all incoming emails for encrypted PDF files. Which code snippet completes the message filter?
An engineer must configure an incoming antispam mail policy in Cisco Secure Email Gateway for IT users. The solution must meet these requirements: •The policy must be editable only by administrators.
•The policy must be activated for all incoming emails that are destined for admin@cisco.com .
These configurations have been performed already:
•Create an incoming mail policy.
•Set the name and the role to admin.
•Activate the antispam security service.
Which two additional actions must be taken to complete the configuration? (Choose two.)
Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)
What is the maximum message size that can be configured for encryption on the Cisco ESA?
An administrator has cr eated a content filter to quarantine all messages that result in an SPF hardfail to review the messages and determine whether a trusted partner has accidentally misconfigured the DNS settings. The administrator sets the policy quarantine to release the mes sages after 24 hours, allowing time to review while not interrupting business.
Which additional option should be used to help the end users be aware of the elevated risk of interacting with these messages?
Which suboption must be selected when LDAP is configured for Spam Quarantine End-User Authentication?
A network engineer is reviewing the record presented.

Which type of DNS record would contain the record as per the DKIM public key RFC 6376?
An engineer must configure Directory Harvest Attack Prevention for SMTP in Cisco Secure Email Gateway. This error message must be sent when the listener receives more than 50 invalid
recipients per hour.
•500 - Too many requests
•Max. Invalid Recipients Per Hour was set to 50 already.
Which two actions must be taken next to set maximum invalid recipients per hour to meet the requirement? (Choose two.)
An engineer is configuring a Cisco Secure Email Gateway and needs to reject email messages to a recipient with email address user0516585210@acme.com . Which list contains the allowed recipient addresses?
A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”
Which feature must be used to address this?
CCNP Security | 300-720 Written Exam | 300-720 Questions Answers | 300-720 Test Prep | 300-720 CCNP Security Actual Questions | Securing Email with Cisco Email Security Appliance (300-720 SESA) Exam Questions PDF | 300-720 Online Exam | 300-720 Practice Test | 300-720 PDF | 300-720 CCNP Security Dumps | 300-720 Test Questions | 300-720 Study Material | 300-720 Exam Preparation | 300-720 Valid Dumps | 300-720 Real Questions | 300-720 CCNP Security Practice Test | CCNP Security 300-720 Dumps | Securing Email with Cisco Email Security Appliance (300-720 SESA) Exam Questions