Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 300-720 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.

Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)

Options:

A.

message-ID


B.

sender


C.

URL reputation


D.

from


E.

mail-from


Expert Solution
Questions # 32:

What is the default behavior of any listener for TLS communication?

Options:

A.

preferred-verify


B.

off


C.

preferred


D.

required


Expert Solution
Questions # 33:

What is the order of virus scanning when multilayer antivirus scanning is configured?

Options:

A.

The default engine scans for viruses first and the McAfee engine scans for viruses second.


B.

The Sophos engine scans for viruses first and the McAfee engine scans for viruses second.


C.

The McAfee engine scans for viruses first and the default engine scans for viruses second.


D.

The McAfee engine scans for viruses first and the Sophos engine scans for viruses second.


Expert Solution
Questions # 34:

A Cisco Secure Email Gateway appliance is processing many messages that are sent to invalid recipients verification. Which two steps are required to accomplish this task? (Choose two.)

Options:

A.

Enable external LDAP authentication


B.

Configure the LDAP query on a listener


C.

Configure LDAP server profiles


D.

Enable LDAP authentication on a listener


E.

Configure incoming mail policy to query LDAP server


Expert Solution
Questions # 35:

An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Cisco ESA should be used to achieve this?

Options:

A.

incoming mail policies


B.

safelist


C.

blocklist


D.

S/MIME Sending Profile


Expert Solution
Questions # 36:

Refer to the exhibit.

Question # 36

Which additional configuration action must be taken to protect against Directory Harvest Attacks?

Options:

A.

When LDAP Queries are configured, Directory Harvest Attack Prevention is enabled by default.


B.

In the LDAP Server profile, configure Directory Harvest Attack Prevention


C.

In the mail flow policy, configure Directory Harvest Attack Prevention.


D.

In the Listener Settings, modify the LDAP Queries configuration to use the Work Queue


Expert Solution
Questions # 37:

When the Cisco ESA is configured to perform antivirus scanning, what is the default timeout value?

Options:

A.

30 seconds


B.

90 seconds


C.

60 seconds


D.

120 seconds


Expert Solution
Questions # 38:

Which attack is mitigated by using Bounce Verification?

Options:

A.

spoof


B.

denial of service


C.

eavesdropping


D.

smurf


Expert Solution
Questions # 39:

Which two components must be configured to perform DLP scanning? (Choose two.)

Options:

A.

Add a DLP policy on the Incoming Mail Policy.


B.

Add a DLP policy to the DLP Policy Manager.


C.

Enable a DLP policy on the Outgoing Mail Policy.


D.

Enable a DLP policy on the DLP Policy Customizations.


E.

Add a DLP policy to the Outgoing Content Filter.


Expert Solution
Questions # 40:

An administrator notices that incoming emails with certain attachments do not get delivered to all recipients when the emails have multiple recipients in different domains like cisco.com and test.com. The same emails when sent only to recipients in cisco.com are delivered properly. How must the Cisco Secure Email Gateway be configured to avoid this behavior?

Options:

A.

Modify mail policies for cisco.com to ensure that emails are not dropped.


B.

Modify mail policies so email recipients do not match multiple policies.


C.

Modify DLP configuration to ensure that all attachments are permitted for test.com.


D.

Modify DLP configuration to exempt DLP scanning for messages sent to test.com domain


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions