Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-720 - Securing Email with Cisco Email Security Appliance (300-720 SESA)

Page: 2 / 6
Total 190 questions

An engineer must share threat reporting information from Cisco Secure Email Gateway to Cisco SecureX. Which setting must be enabled in Secure Email Gateway?

A.

SNMP

B.

Security Services Exchange

C.

Cloud Service Settings

D.

System Monitor

An engineer must enable SIDF for a mail flow policy on an incoming listener in Cisco Secure Email Gateway. Drag and drop the actions from the left into the sequence on the right to meet the requirement.

Refer to the exhibit. A security engineer must create a message filter on a Cisco Secure Email Gateway to scan all incoming emails for encrypted PDF files. Which code snippet completes the message filter?

A.

attachment

B.

attachment-binary-include

C.

attachment-binary-contains

D.

attachment-binary-file

What is a benefit of graymail services?

A.

provides the option to unsubscribe from unwanted marketing emails

B.

removes spam based on the sender email address

C.

provides a safe method to subscribe to social network emails

D.

offers cloud and on-site unsubscription service

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Which type of query must be configured when setting up the Spam Quarantine while merging notifications?

A.

Spam Quarantine Alias Routing Query

B.

Spam Quarantine Alias Consolidation Query

C.

Spam Quarantine Alias Authentication Query

D.

Spam Quarantine Alias Masquerading Query

What is needed to sign outbound emails using Domain Keys Identified Mail after a signing profile is created in the Cisco Secure Email Gateway?

A.

Configure in destination controls.

B.

Enable DKIM in an outbound content filter.

C.

Enable DKIM in the mail flow policy.

D.

A signing profile referencing the sender domain is sufficient.

An engineer is configuring a Cisco ESA for the first time and needs to ensure that any email traffic coming from the internal SMTP servers is relayed out through the Cisco ESA and is tied to the Outgoing Mail Policies.

Which Mail Flow Policy setting should be modified to accomplish this goal?

A.

Exception List

B.

Connection Behavior

C.

Bounce Detection Signing

D.

Reverse Connection Verification

Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?

A.

quarantine threat level

B.

antispam

C.

data loss prevention

D.

antivirus

Which content filter condition checks to see if the " From: header " in the message is similar to any of the users in the content dictionary?

A.

Forged Email Detection

B.

SPF Verification

C.

Subject Header

D.

Duplicate Boundaries Verification