Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-720 - Securing Email with Cisco Email Security Appliance (300-720 SESA)

Page: 1 / 6
Total 190 questions

An engineer is testing mail flow on a new Cisco ESA and notices that messages for domain abc.com are stuck in the delivery queue. Upon further investigation, the engineer notices that the messages pending delivery are destined for 192.168.1.11, when they should instead be routed to 192.168.1.10.

What configuration change needed to address this issue?

A.

Add an address list for domain abc.com .

B.

Modify Destination Controls entry for the domain abc.com .

C.

Modify the SMTP route for the domain and change the IP a ddress to 192.168.1.10.

D.

Modify the Routing Tables and add a route for IP address to 192.168.1.10.

Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?

A.

Basic Authentication

B.

No Authentication

C.

Microsoft 365 Authentication

D.

Cisco Security Cloud Sign On

An email containing a URL passes through the Cisco ESA that has content filtering disabled for all mail policies. The sender is sampleuser@test1.com, the recipients are testuser1@test2.com, testuser2@test2.com, testuser3@test2.com, and mailer1@te st2.com. The subject of the email is Test Document395898847. An administrator wants to add a policy to ensure that the Cisco ESA evaluates the web reputation score before permitting this email.

Which two criteria must be used by the administrator to achie ve this? (Choose two.)

A.

Subject contains Test Document "

B.

Sender matches test1.com

C.

Email body contains a URL

D.

Date and time of email

E.

Email does not match mailer1@test2.com

What occurs when configuring separate incoming mail policies?

A.

message splintering

B.

message exceptions

C.

message detachment

D.

message aggregation

Refer to the exhibit. A security engineer must configure a Cisco Secure Email Gateway to ensure that encryption is enabled and the configured profile is provisioned. Which command must be used?

A.

setup

B.

check encryption

C.

provision

D.

profiles

Refer to the exhibits. What must be done to enforce end user authentication before accessing quarantine?

A.

Enable SPAM notification and use LDAP for authentication.

B.

Enable SPAM Quarantine Notification and add the %quarantine_url% variable.

C.

Change the end user quarantine access from Non e authentication to SAAS.

D.

Change the end user quarantine access setting from None authentication to Mailbox.

Which of the following two statements are correct about the large file attachments (greater than 25MB) feature in Cisco Secure Email Encryption Service? (Choose two.)

A.

Large file attachments can only be sent using the websafe portal

B.

This feature allows users to send up to 50MB of attachments in a secure email.

C.

Large file attachments will be sent as a securedoc attachment

D.

Large file attachments can only be sent using the Cisco Secure Email Add-In.

E.

This feature can only be enabled if the Read from Message feature is enabled

Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.)

A.

The filters command executed from the CLI is used to configure the message filters.

B.

Message filters configuration within the web user interface is located within Incoming Content Filters.

C.

The filterconfig command executed from the CLI is used to configure message filters.

D.

Message filters can be configured only from the CLI.

E.

Message filters can be configured only from the web user interface.

Which two steps configure Forged Email Detection? (Choose two.)

A.

Configure a content dictionary with executive email addresses.

B.

Configure a filter to use the Forged Email Detection rule and dictionary.

C.

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.

Enable Forged Email Detection on the Security Services page.

E.

Configure a content dictionary with friendly names.

What are two primary components of content filters? (Choose two.)

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies