Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-720 - Securing Email with Cisco Email Security Appliance (300-720 SESA)

Page: 2 / 5
Total 147 questions

What is the maximum message size that can be configured for encryption on the Cisco ESA?

A.

20 MB

B.

25 MB

C.

15 MB

D.

30 MB

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)

A.

DKIM

B.

Public Keys

C.

Domain Keys

D.

Symmetric Keys

E.

Private Keys

What is the default method of remotely accessing a newly deployed Cisco Secure Email Virtual Gateway when a DHCP server is not available?

A.

Manual configuration of an IP address is required through the serial port before remote access

B.

DHCP is required for the initial IP address assignment

C.

Use the IP address of 192.168 42 42 via the Management port

D.

Manual configuration of an IP address is required through the hypervisor console before remote access

A security administrator deployed a Cisco Secure Email Gateway appliance with a mail policy configured to store suspected spam for review. The appliance is the DMZ and only the standard HTTP/HTTPS ports are allowed by the firewall. An administrator wants to ensure that users can view any suspected spam that was blocked. Which action must be taken to meet this requirement?

A.

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

B.

Enable the Spam Quarantine and leave the default settings unchanged.

C.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

D.

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

When a network engineer is troubleshooting a mail flow issue, they discover that some emails are rejected with an SMTP code of 451 and the error message "#4.7.1 Unable to perform DMARC verification". In the DMARC verification profile on the Cisco Secure Email Gateway appliance, which action must be set for messages that result in temporary failure to prevent these emails from being rejected?

A.

Accept

B.

Ignore

C.

Quarantine

D.

No Action

Which attack is mitigated by using Bounce Verification?

A.

spoof

B.

denial of service

C.

eavesdropping

D.

smurf

An organization wants to use DMARC to improve its brand reputation by leveraging DNS records.

Which two email authentication mechanisms are utilized during this process? (Choose two.)

A.

SPF

B.

DSTP

C.

DKIM

D.

TLS

E.

PKI

Drag and drop authentication options for End-User Quarantine Access from the left onto the corresponding configuration steps on the right.

Which two factors must be considered when message filter processing is configured? (Choose two.)

A.

message-filter order

B.

lateral processing

C.

structure of the combined packet

D.

mail policies

E.

MIME structure of the message

What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

A.

8025

B.

6443

C.

6025

D.

8443