Securing Email with Cisco Email Security Appliance (300-720 SESA) v1.0 (300-720)

Page:    1 / 10   
Total 141 questions

What is a benefit of enabling external SPAM quarantine on Cisco SMA?

  • A. It provides access to the SPAM quarantine interface on which a user can release, duplicate, or delete.
  • B. It provides the ability to scan messages by using two engines to increase a catch rate.
  • C. It provides the ability to consolidate SPAM quarantine data from multiple Cisco ESAs to one central console.
  • D. It provides the ability to back up SPAM quarantine from multiple Cisco ESAs to one central console.


Answer : C

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

  • A. message-ID
  • B. sender
  • C. URL reputation
  • D. from
  • E. mail-from


Answer : BD

To comply with a recent audit, an engineer must configure anti-virus message handling options on the incoming mail policies to attach warnings to the subject of an email.

What should be configured to meet this requirement for known viral emails?

  • A. Virus Infected Messages
  • B. Unscannable Messages
  • C. Encrypted Messages
  • D. Positively Identified Messages


Answer : C

An administrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.

How is this accomplished?

  • A. Disable the VOF feature before sending SPAM to the external quarantine.
  • B. Configure a mail policy to determine whether the message is sent to the local or external quarantine.
  • C. Disable the local quarantine before sending SPAM to the external quarantine.
  • D. Configure a user policy to determine whether the message is sent to the local or external quarantine.


Answer : B

A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.

What is the reason of this?

  • A. The “From” header is checked against all policies in a top-down fashion.
  • B. The message header with the highest priority is checked against each policy in a top-down fashion.
  • C. The “To” header is checked against all policies in a top-down fashion.
  • D. The message header with the highest priority is checked against the Default policy in a top-down fashion.


Answer : D

An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Cisco ESA should be used to achieve this?

  • A. incoming mail policies
  • B. safelist
  • C. blocklist
  • D. S/MIME Sending Profile


Answer : A

An engineer is testing mail flow on a new Cisco ESA and notices that messages for domain abc.com are stuck in the delivery queue. Upon further investigation, the engineer notices that the messages pending delivery are destined for 192.168.1.11, when they should instead be routed to 192.168.1.10.

What configuration change needed to address this issue?

  • A. Add an address list for domain abc.com.
  • B. Modify Destination Controls entry for the domain abc.com.
  • C. Modify the SMTP route for the domain and change the IP address to 192.168.1.10.
  • D. Modify the Routing Tables and add a route for IP address to 192.168.1.10.


Answer : C



Refer to the exhibit. An engineer is trying to connect to a Cisco ESA using SSH and has been unsuccessful. Upon further inspection, the engineer notices that there is a loss of connectivity to the neighboring switch.

Which connection method should be used to determine the configuration issue?

  • A. Telnet
  • B. HTTPS
  • C. Ethernet
  • D. serial


Answer : D



Refer to the exhibit. How should this configuration be modified to stop delivering Zero Day malware attacks?

  • A. Change Unscannable Action from Deliver As Is to Quarantine.
  • B. Change File Analysis Pending action from Deliver As Is to Quarantine.
  • C. Configure mailbox auto-remediation.
  • D. Apply Prepend on Modify Message Subject under Malware Attachments.


Answer : C

An administrator manipulated the subnet mask but was still unable to access the user interface. How must the administrator access the appliance to perform the initial configuration?

  • A. Use the data 2 port.
  • B. Use the serial or console port.
  • C. Use the data 1 port.
  • D. Use the management port.


Answer : B

A Cisco ESA administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?

  • A. Delay
  • B. Accept
  • C. Relay
  • D. Reject


Answer : C

An administrator needs to configure a Cisco ESA to block specific domains based on their reputation. Which service within the Cisco ESA should be utilized to accomplish this task?

  • A. Receiving SMTP Policy
  • B. Data Loss Prevention
  • C. Anti-Virus
  • D. Sender Group


Answer : A

An administrator notices that the Cisco ESA delivery queue is consistently full. After further investigation, it is determined that the IP addresses currently in use by the Cisco ESA are being rate-limited by some destinations. The administrator creates a new interface with an additional IP address using virtual gateway technology, but the issue is not solved. Which configuration change resolves the issue?

  • A. Use the CLI command alt-src-host to set the new interface as a possible delivery candidate.
  • B. Use the CLI command loadbalance auto to enable mail delivery over all interfaces.
  • C. Use the CLI command deliveryconfig to set the new interface as the primary interface for mail delivery.
  • D. Use the CLI command altsrchost to set the new interface as the source IP address for all mail.


Answer : B

An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco ESA. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)

  • A. receivers
  • B. domains
  • C. reputation score
  • D. spf check
  • E. senders


Answer : CE

What is a benefit of deploying Cisco SMA?

  • A. centralized management of logs for Cisco ESA appliances
  • B. centralized management of botnet directories
  • C. centralized management of software updates for Cisco ESA appliances
  • D. centralized management of quarantined email


Answer : C

Page:    1 / 10   
Total 141 questions