Pre-Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

300-720 Sample Questions Answers

Questions 4

A security administrator deployed a Cisco Secure Email Gateway appliance with a mail policy configured to store suspected spam for review. The appliance is the DMZ and only the standard HTTP/HTTPS ports are allowed by the firewall. An administrator wants to ensure that users can view any suspected spam that was blocked. Which action must be taken to meet this requirement?

Options:

A.

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

B.

Enable the Spam Quarantine and leave the default settings unchanged.

C.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

D.

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

Buy Now
Questions 5

Refer to the exhibit.

For improved security, an administrator wants to warn users about opening any links or attachments within an email How must the administrator configure an HTML-coded message at the top of an email body to create this warning?

Options:

A.

Create a text resource type of Disclaimer Template paste the HTML code into the text box. then use this text resource inside a content filter

B.

Create a text resource type of Disclaimer Template change to code view to paste the HTML code into the text box, then use this text resource inside a content filter

C.

Create a text resource type of Notification Template, paste the HTML code into the text box, then use this text resource inside a content filter.

D.

Create a text resource type of Notification Template, change to code view to paste the HTML code into the text box. then use this text resource inside a content filter.

Buy Now
Questions 6

Which type of query must be configured when setting up the Spam Quarantine while merging notifications?

Options:

A.

Spam Quarantine Alias Routing Query

B.

Spam Quarantine Alias Consolidation Query

C.

Spam Quarantine Alias Authentication Query

D.

Spam Quarantine Alias Masquerading Query

Buy Now
Questions 7

When virtual gateways are configured, which two distinct attributes are allocated to each virtual gateway address? (Choose two.)

Options:

A.

domain

B.

IP address

C.

DNS server address

D.

DHCP server address

E.

external spam quarantine

Buy Now
Questions 8

What is the function of authenticating SMTP sessions using client certificates?

Options:

A.

Users must configure a mail client to send messages through a secure SSL connection and accept a server certificate from the appliance.

B.

If the certificate is valid, the Secure Email Gateway allows an SMTP connection from the mail client over TLS.

C.

If the Secure Email Gateway is configured to require users to provide a certificate when sending mail, no exceptions are allowed for any users.

D.

The Secure Email Gateway requests a client certificate from a user ' s mail client during connection to the appliance.

Buy Now
Questions 9

What are organizations trying to address when implementing a SPAM quarantine?

Options:

A.

true positives

B.

false negatives

C.

false positives

D.

true negatives

Buy Now
Questions 10

Which antispam feature is utilized to give end users control to allow emails that are spam to be delivered to their inbox, overriding any spam verdict and action on the Cisco ESA?

Options:

A.

end user allow list

B.

end user spam quarantine access

C.

end user passthrough list

D.

end user safelist

Buy Now
Questions 11

A Cisco ESA administrator was notified that a user wa s not receiving emails from a specific domain. After reviewing the mail logs, the sender had a negative sender-based reputation score.

What should the administrator do to allow inbound email from that specific domain?

Options:

A.

Create a new inbound mail polic y with a message filter that overrides Talos.

B.

Ask the user to add the sender to the email application ' s allow list.

C.

Modify the firewall to allow emails from the domain.

D.

Add the domain into the allow list.

Buy Now
Questions 12

An engineer deploys a Cisco Secure Email Gateway appliance with default settings in an organization that permits only standard H feature does not work. Which additional action resolves the issue?

Options:

A.

Configure the outbound firewall rule to permit traffic on port 8081

B.

Enable the Use HTTP option under Advanced Settings for File Reputation.

C.

Enable the Use SSL option under Advanced Settings for File Reputation.

D.

Configure the outbound firewall rule to permit traffic on port 3237

E.

TP/HTTPS ports outbound and notices that the AMP file reputation

Buy Now
Questions 13

Refer to the exhibit. An engineer is trying to connect to a Cisco E SA using SSH and has been unsuccessful. Upon further inspection, the engineer notices that there is a loss of connectivity to the neighboring switch.

Which connection method should be used to determine the configuration issue?

Options:

A.

Telnet

B.

HTTPS

C.

Ethernet

D.

serial

Buy Now
Questions 14

Which cloud service provides a reputation verdict for email messages based on the sender domain and other attributes?

Options:

A.

Cisco AppDynamics

B.

Cisco Secure Email Threat Defense

C.

Cisco Secure Cloud Analytics

D.

Cisco Talos

Buy Now
Questions 15

When a network engineer is troubleshooting a mail flow issue, they discover that some emails are rejected with an SMTP code of 451 and the error message " #4.7.1 Unable to perform DMARC verification " . In the DMARC verification profile on the Cisco Secure Email Gateway appliance, which action must be set for messages that result in temporary failure to prevent these emails from being rejected?

Options:

A.

Accept

B.

Ignore

C.

Quarantine

D.

No Action

Buy Now
Questions 16

What is the purpose of Cisco Email Encryption on Cisco ESA?

Options:

A.

to ensure anonymity between a recipient and MTA

B.

to ensure integrity between a sender and MTA

C.

to aut henticate direct communication between a sender and Cisco ESA

D.

to ensure privacy between Cisco ESA and MTA

Buy Now
Questions 17

An engineer must enable encryption on a Cisco Secure Email Gateway. The maximum size of each message must be 20 MB. Drag and drop the actions from the left into sequence on the right to meet the requirement.

Options:

Buy Now
Questions 18

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

Options:

A.

DHAP

B.

SBRS

C.

LDAP

D.

SMTP

Buy Now
Questions 19

An engineer wants to ensure that emails received by company users that contain URLs do not make them susceptible to data loss from accessing malicious or undesired external content sources Which two features must be configured on Cisco Secure Email Gateway to meet this requirement1? (Choose two.)

Options:

A.

antispam scanning

B.

data loss prevention

C.

graymail detection

D.

URL filtering

E.

antivirus scanning

Buy Now
Questions 20

An engineer must configure incoming message verification using DM ARC in Cisco Secure Email Gateway. Emails from VP@cisco.com must skip the verification Drag and drop the actions from the left into the sequence on the right to meet the requirement.

Options:

Buy Now
Questions 21

Which two action types are performed by Cisco ESA message filters? (Choose two.)

Options:

A.

non-final actions

B.

filter actions

C.

discard actions

D.

final actions

E.

quarantine actions

Buy Now
Questions 22

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Buy Now
Questions 23

When URL logging is configured on a Cisco ESA, which feature must be enabled first?

Options:

A.

antivirus

B.

antispam

C.

virus outbreak filter

D.

senderbase reputation filter

Buy Now
Questions 24

An organization wants to use DMARC to improve its brand reputation by leveraging DNS records.

Which two email authentica tion mechanisms are utilized during this process? (Choose two.)

Options:

A.

SPF

B.

DSTP

C.

DKIM

D.

TLS

E.

PKI

Buy Now
Questions 25

Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?

Options:

A.

Basic Authentication

B.

No Authentication

C.

Microsoft 365 Authentication

D.

Cisco Security Cloud Sign On

Buy Now
Questions 26

An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)

Options:

A.

domains

B.

senders

C.

reputation score

D.

receivers

E.

spf check

Buy Now
Questions 27

An organization wants to use its existing Cisco ESA to host a new domain and enforce a separate corporate policy for that domain.

What should be done on the Cisco ESA to achieve this?

Options:

A.

Use the smtproutes command to configure a SMTP route for the new domain.

B.

Use the deli very config command to configure mail delivery for the new domain.

C.

Use the dsestconf command to add a separate destination for the new domain.

D.

Use the altrchost command to add a separate gateway for the new domain.

Buy Now
Questions 28

The CEO sent an email indicating that all emails containing a string of 123ABCDEFGHJ cannot be delivered and must be sent into quarantine for further inspection. Given the requirement, which regular expression should be used to match on that criteria?

Options:

A.

\\D{3}[A-Z]{9}

B.

\d{3}[A-Z]{9}

C.

\W{3}[A-Z]{9}

D.

{3}\d{9}[A-Z]

Buy Now
Questions 29

An analyst creates a new content dictionary to use with Forged Email Detection.

Which entry will be added into the dictionary?

Options:

A.

mycompany.com

B.

Alpha Beta

C.

^Alpha\ Beta$

D.

Alpha.Beta@mycompany.com

Buy Now
Questions 30

Which global setting is configured under Cisco ESA Scan Behavior?

Options:

A.

minimum attachment size to scan

B.

attachment scanning timeout

C.

actions for unscannable messages due to attachment type

D.

minimum depth of attachment recursion to scan

Buy Now
Questions 31

Spreadsheets containing credit card numbers are being allowed to bypass the Cisco ESA.

Which outgoing mail policy feature should be configured to catch this content before it leaves the network?

Options:

A.

file reputation filtering

B.

outbreak filtering

C.

data loss prevention

D.

file analysis

Buy Now
Questions 32

Which action is a valid fallback when a client certificate is unavailable during SMTP authentication on Cisco ESA?

Options:

A.

LDAP Query

B.

SMTP AUTH

C.

SMTP TLS

D.

LDAP BIND

Buy Now
Questions 33

Refer to the exhibit. How does the Cisco Secure Email Gateway handle an email with an unknown Microsoft Word document?

Options:

A.

The email is quarantined.

B.

The email is dropped.

C.

The file is sent to the cloud for file analysis.

D.

The email is delivered without file analysis.

Buy Now
Questions 34

An engineer is configuring a Cisco Secure Email Gateway and needs to reject email messages to a recipient with email address user0516585210@acme.com . Which list contains the allowed recipient addresses?

Options:

A.

BAT

B.

HAT

C.

SAT

D.

RAT

Buy Now
Questions 35

Which two are configured in the DMARC verification profile? (Choose two.)

Options:

A.

name of the verification profile

B.

minimum number of signatures to verify

C.

ESA listeners to use the verification profile

D.

message action into an incoming or outgoing content filter

E.

message action to take when the policy is reject/quarantine

Buy Now
Questions 36

An engineer wants to utilize a digital signature in outgoing emails to validate to others that the email they are receiving was indeed sent and authorized by the owner of that domain Which two components should be configured on the Cisco Secure Email Gateway appliance to achieve this? (Choose two.)

Options:

A.

DMARC verification profile

B.

SPF record

C.

Public/Private keypair

D.

Domain signing profile

E.

PKI certificate

Buy Now
Questions 37

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: < ceo@example com > must be entered. What must be added to the dictionary to accomplish this goal?

Options:

A.

example.com

B.

Example CEO

C.

ceo

D.

ceo@example com

Buy Now
Questions 38

An engineer must configure a virtual gateway on a Cisco Secure Email Gateway to send email for a group named Grouplnt. Grouplnt is part of these domains:

•domain 1 -lab

•domain2.lab

Drag and drop the code snippets from the right onto the boxes to configure the virtual gateway. Not all options are used.

Options:

Buy Now
Questions 39

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

Options:

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

Buy Now
Questions 40

Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?

Options:

A.

A policy quarantine is missing.

B.

More than one email pipeline is defined.

C.

The " modify the message subject " is already set.

D.

The " add custom header " action is performed first.

Buy Now
Questions 41

What is the default method of remotely accessing a newly deployed Cisco Secure Email Virtual Gateway when a DHCP server is not available?

Options:

A.

Manual configuration of an IP address is required through the serial port before remote access

B.

DHCP is required for the initial IP address assignment

C.

Use the IP address of 192.168 42 42 via the Management port

D.

Manual configuration of an IP address is required through the hypervisor console before remote access

Buy Now
Questions 42

When DKIM signing is configured, which DNS record must be updated to load the DKIM public signing key?

Options:

A.

AAAA record

B.

PTR record

C.

TXT record

D.

MX record

Buy Now
Questions 43

Which two components form the graymail management solution in Cisco ESA? (Choose two.)

Options:

A.

cloud-based unsubscribe service

B.

uniform unsubscription management interface for end users

C.

secure subscribe option for end users

D.

integrated graymail scanning engine

E.

improved mail efficacy

Buy Now
Questions 44

Which restriction is in place for end users accessing the spam quarantine on Cisco Secure Email Gateway appliances?

Options:

A.

Access via a link in a notification is mandatory.

B.

The end user must be assigned to the Guest role

C.

Direct access via web browser requires authentication.

D.

Authentication is required when accessing via a link in a notification.

Buy Now
Questions 45

An organization is enforcing TLS with an external party. The external business employs its own internal CA so the Secure Email Gateway cannot verify the TLS connection. Which action must an engineer take for the Cisco Secure Email Gateway to trust the connection?

Options:

A.

Choose Add Certificate on the Network > Certificates page and create a self-signed certificate.

B.

Enable a custom list on the Network > Certificates page and upload the certificates for the trusted authorities.

C.

Modify Destination Controls and set TLS Support to Required for all external and internal destinations.

D.

Edit Destination Controls and add the external party domain to the Destination Control Table as trusted.

Buy Now
Questions 46

An engineer must configure a policy quarantine in Cisco Secure Email Gateway. The retention time must be 7 days and user@cisco.com must have access to the quarantine. Drag and drop the actions from the left into the sequence on the right to meet the requirements.

Options:

Buy Now
Questions 47

What is the order of virus scanning when multilayer antivirus scanning is configured?

Options:

A.

The default engine scans for viruses first and the McAfee engine scans for viruses second.

B.

The Sophos engine scans for viruses first and the McAfee engine scans for viruses second.

C.

The McAfee engine scans for viruses first and the default engine scans for viruses second.

D.

The McAfee engine scans for viruses first and the Sophos engine scans for viruses second.

Buy Now
Questions 48

A recent engine update was pulled down for graymail and has caused the service to start crashing. It is critical to fix this as quickly as possible.

What must be done to address this issue?

Options:

A.

Roll back to a previous version of the engine from the Services Overview page.

B.

Roll back to a previous version of the engine from the System Health page.

C.

Download another update from the IMS and Graymail page.

D.

Download another update from the Service Updat es page.

Buy Now
Questions 49

An engineer must configure a mail policy for all incoming email that contains a Microsoft Excel attachment. All such email must be quarantined without any exception. After the incoming mail policy is created, which action must be taken next to meet the requirement?

Options:

A.

Set the quarantine threat level threshold to 1.

B.

Configure the Outgoing Content Filters settings.

C.

Set the quarantine threat level threshold to 5.

D.

Create an incoming content filter to match required attachments.

Buy Now
Questions 50

Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?

Options:

A.

Add an additional mapping for attachment type for zip files.

B.

Enable assume match pattern if the email was not scanned for any reason.

C.

Increase the maximum recursion depth from 5 to a larger value.

D.

Increase the maximum attachment size to scan to a larger value.

Buy Now
Questions 51

Which two factors must be considered when message filter processing is configured? (Choose two.)

Options:

A.

message-filter order

B.

lateral processing

C.

structure of the combined packet

D.

mail policies

E.

MIME structure of the message

Buy Now
Questions 52

An organization has a strict policy on URLs embedded in emails. The policy allows visibility into what the URL is but does not allow the user to click it. Which action must be taken to meet the requirements of the security policy?

Options:

A.

Enable the URL quarantine policy

B.

Defang the URL.

C.

Replace the URL with text

D.

Redirect the URL to the Cisco security proxy

Buy Now
Questions 53

An engineer is tasked with reviewing mail logs to confirm that messages sent from domain abc.com are passing SPF verification and being accepted by the Cisco ESA. The engineer notices that SPF veri fication is not being performed and that SPF is not being referenced in the logs for messages sent from domain abc.com.

Why is the verification not working properly?

Options:

A.

SPF verification is disabled in the Recipient Access Table.

B.

SPF verification i s disabled on the Mail Flow Policy.

C.

The SPF conformance level is set to SIDF compatible on the Mail Flow Policy.

D.

An SPF verification Content Filter has not been created.

Buy Now
Questions 54

A network engineer is reviewing the record presented.

Which type of DNS record would contain the record as per the DKIM public key RFC 6376?

Options:

A.

MX

B.

PTR

C.

SRV

D.

TXT

Buy Now
Questions 55

Refer to the exhibit. How does a Cisco Secure Email Gateway handle an email that is identified both as spam positive and outbreak positive by outbreak filters?

Options:

A.

The email is sent to outbreak quarantine and is rescanned for spam before being released.

B.

The email is sent only to the outbreak quarantine.

C.

The email is sent to spam quarantine and outbreak quarantine.

D.

The email is sent only to the spam quarantine.

Buy Now
Questions 56

A Cisco ESA administrator has noticed that new messages being sent to the Centralized Policy Quarantine are being released after one hour. Previously, they were being held for a day before being released.

What was configured that caused this to occur?

Options:

A.

The retention period was changed to one hour.

B.

The threshold settings were set to override the clock se ttings.

C.

The retention period was set to default.

D.

The threshold settings were set to default.

Buy Now
Questions 57

A network engineer is integrating Cisco Secure Email Gateway with Cisco SecureX. Which two actions must be taken before registering Cisco Secure Email Gateway with Cisco SecureX? (Choose two.)

Options:

A.

Run the threatresponseconflg command in SecureX

B.

Open TCP port 22 on the firewall

C.

Open TCP port 443 on the firewall.

D.

Run the cloudserviceconflg command in SecureX

E.

Create an admin account in SecureX

Buy Now
Exam Code: 300-720
Exam Name: Securing Email with Cisco Email Security Appliance (300-720 SESA)
Last Update: Apr 25, 2026
Questions: 190
$61.25  $174.99
$47.25  $134.99
$40.25  $114.99
buy now 300-720