Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 300-720 - Securing Email with Cisco Email Security Appliance (300-720 SESA)

Page: 1 / 5
Total 147 questions

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

A.

default

B.

system

C.

user

D.

custom

E.

demo

Which antispam feature is utilized to give end users control to allow emails that are spam to be delivered to their inbox, overriding any spam verdict and action on the Cisco ESA?

A.

end user allow list

B.

end user spam quarantine access

C.

end user passthrough list

D.

end user safelist

A list of company executives is routinely being spoofed, which puts the company at risk of malicious email attacks An administrator must ensure that executive messages are originating from legitimate sending addresses Which two steps must be taken to accomplish this task? (Choose two.)

A.

Create an incoming content filter with SPF detection.

B.

Enable the Forged Email Detection feature under Security Settings.

C.

Enable DMARC feature under Mail Policies.

D.

Create an incoming content filter with the Forged Email Detection condition

E.

Create a content dictionary including a list of the names that are being spoofed.

Which two action types are performed by Cisco ESA message filters? (Choose two.)

A.

non-final actions

B.

filter actions

C.

discard actions

D.

final actions

E.

quarantine actions

Spammers routinely try to send emails with the recipient field filled with a list of all possible combinations of letters and numbers. These combinations, appended with a company domain name are malicious attempts at learning all possible valid email addresses. Which action must be taken on a Cisco Secure Email Gateway to prevent this from occurring?

A.

Select the SMTP Authentication Query checkbox

B.

Perform LDAP acceptance validation.

C.

Quarantine external authentication queries.

D.

Enable end user safelist features

An engineer wants to ensure that emails received by company users that contain URLs do not make them susceptible to data loss from accessing malicious or undesired external content sources Which two features must be configured on Cisco Secure Email Gateway to meet this requirement1? (Choose two.)

A.

antispam scanning

B.

data loss prevention

C.

graymail detection

D.

URL filtering

E.

antivirus scanning

An administrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.

How is this accomplished?

A.

Disable the VOF feature before sending SPAM to the external quarantine.

B.

Configure a mail policy to determine whether the message is sent to the local or external quarantine.

C.

Disable the local quarantine before sending SPAM to the external quarantine.

D.

Configure a user policy to determine whether the message is sent to the local or external quarantine.

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?

A.

Enable the DKIM service checker

B.

Export the DNS TXT record to provide to the DNS registrar

C.

Import the DNS record of the service provider into the Cisco Secure Email Gateway.

D.

Configure the Trusted Sender Group message authenticity policy.

Which feature must be activated on a Cisco Secure Email Gateway to combat backscatter?

A.

Graymail Detection

B.

Bounce Verification

C.

Forged Email Detection

D.

Bounce Profile

What is the default behavior of any listener for TLS communication?

A.

preferred-verify

B.

off

C.

preferred

D.

required