Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-720 - Securing Email with Cisco Email Security Appliance (300-720 SESA)

Page: 4 / 5
Total 147 questions

Which global setting is configured under Cisco ESA Scan Behavior?

A.

minimum attachment size to scan

B.

attachment scanning timeout

C.

actions for unscannable messages due to attachment type

D.

minimum depth of attachment recursion to scan

Drag and drop the AsyncOS methods for performing DMARC verification from the left into the correct order on the right.

Which action must be taken before a custom quarantine that is being used can be deleted?

A.

Delete the quarantine that is assigned to a filter.

B.

Delete the quarantine that is not assigned to a filter.

C.

Delete only the unused quarantine.

D.

Remove the quarantine from the message action of a filter.

Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.)

A.

The filters command executed from the CLI is used to configure the message filters.

B.

Message filters configuration within the web user interface is located within Incoming Content Filters.

C.

The filterconfig command executed from the CLI is used to configure message filters.

D.

Message filters can be configured only from the CLI.

E.

Message filters can be configured only from the web user interface.

Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?

A.

Add an additional mapping for attachment type for zip files.

B.

Enable assume match pattern if the email was not scanned for any reason.

C.

Increase the maximum recursion depth from 5 to a larger value.

D.

Increase the maximum attachment size to scan to a larger value.

Refer to the exhibit. An engineer needs to change the existing Forged Email Detection message filter so that it references a newly created dictionary named ‘Executives’.

What should be done to accomplish this task?

A.

Change "from" to "Executives".

B.

Change "TESF to "Executives".

C.

Change fed' to "Executives".

D.

Change "support" to "Executives".

Which action is a valid fallback when a client certificate is unavailable during SMTP authentication on Cisco ESA?

A.

LDAP Query

B.

SMTP AUTH

C.

SMTP TLS

D.

LDAP BIND

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

What are the two different phases in the process of Cisco Secure Email Gateway performing S/MIME encryption? (Choose two.)

A.

Attach the encrypted public key to the message

B.

Encrypt the message body using the session key

C.

Send the encrypted message to the sender

D.

Attach the encrypted symmetric key to the message

E.

Create a pseudo-random session key.

An administrator manipulated the subnet mask but was still unable to access the user interface. How must the administrator access the Cisco Secure Email Gateway appliance to perform the initial configuration?

A.

Use the serial or console port

B.

Use the management port

C.

Use the data 2 port

D.

Use the data 1 port