cisco 300-720 practice test

Securing Email with Cisco Email Security Appliance (SESA)


Question 1 Topic 6

Topic 6
Which two Cisco ESA features are used to control email delivery based on the sender? (Choose two.)

  • A. incoming mail policies
  • B. spam quarantine
  • C. outbreak filter
  • D. safelists
  • E. blocklists
Answer:

D E

Discussions

Question 2 Topic 6

Topic 6
What are organizations trying to address when implementing a SPAM quarantine?

  • A. true positives
  • B. false negatives
  • C. false positives
  • D. true negatives
Answer:

C

Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-
0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_0100000.html#con_1482874

Discussions

Question 3 Topic 6

Topic 6
A Cisco ESA administrator has noticed that new messages being sent to the Centralized Policy Quarantine are being
released after one hour. Previously, they were being held for a day before being released.
What was configured that caused this to occur?

  • A. The retention period was changed to one hour.
  • B. The threshold settings were set to override the clock settings.
  • C. The retention period was set to default.
  • D. The threshold settings were set to default.
Answer:

D

Discussions

Question 4 Topic 6

Topic 6
Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?

  • A. A policy quarantine is missing.
  • B. More than one email pipeline is defined.
  • C. The "modify the message subject" is already set.
  • D. The "add custom header" action is performed first.
Answer:

B

Discussions

Question 5 Topic 6

Topic 6
What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

  • A. 83
  • B. 82
  • C. 443
  • D. 80
Answer:

A

Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/ces/user_guide/esa_user_guide_11-
1/b_ESA_Admin_Guide_ces_11_1/b_ESA_Admin_Guide_chapter_011111.pdf

Discussions

Question 6 Topic 6

Topic 6
Which two steps are needed to disable local spam quarantine before external quarantine is enabled? (Choose two.)

  • A. Uncheck the Enable Spam Quarantine check box.
  • B. Select Monitor and click Spam Quarantine.
  • C. Check the External Safelist/Blocklist check box.
  • D. Select External Spam Quarantine and click on Configure.
  • E. Select Security Services and click Spam Quarantine.
Answer:

A B

Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118555-qa-esa-00.html
(configuration summary)

Discussions

Question 7 Topic 6

Topic 6
What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

  • A. 8025
  • B. 6443
  • C. 6025
  • D. 8443
Answer:

C

Explanation:
Reference: https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118692-configure-esa-00.html

Discussions

Question 8 Topic 6

Topic 6
Which type of query must be configured when setting up the Spam Quarantine while merging notifications?

  • A. Spam Quarantine Alias Routing Query
  • B. Spam Quarantine Alias Consolidation Query
  • C. Spam Quarantine Alias Authentication Query
  • D. Spam Quarantine Alias Masquerading Query
Answer:

B

Discussions

Question 9 Topic 6

Topic 6
Which action must be taken before a custom quarantine that is being used can be deleted?

  • A. Delete the quarantine that is assigned to a filter.
  • B. Delete the quarantine that is not assigned to a filter.
  • C. Delete only the unused quarantine.
  • D. Remove the quarantine from the message action of a filter.
Answer:

D

Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-
0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_011111.html

Discussions

Question 10 Topic 6

Topic 6
Which suboption must be selected when LDAP is configured for Spam Quarantine End-User Authentication?

  • A. Designate as the active query
  • B. Update Frequency
  • C. Server Priority
  • D. Entity ID
Answer:

A

Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/security_management/sma/sma11-
5/user_guide/b_SMA_Admin_Guide_11_5/b_SMA_Admin_Guide_11_5_chapter_01010.html

Discussions
To page 2