Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-720 Cisco Securing Email with Cisco Email Security Appliance (300-720 SESA) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 147 questions

An administrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.

How is this accomplished?

A.

Disable the VOF feature before sending SPAM to the external quarantine.

B.

Configure a mail policy to determine whether the message is sent to the local or external quarantine.

C.

Disable the local quarantine before sending SPAM to the external quarantine.

D.

Configure a user policy to determine whether the message is sent to the local or external quarantine.

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: must be entered. What must be added to the dictionary to accomplish this goal?

A.

example.com

B.

Example CEO

C.

ceo

D.

ceo@example com

What are two phases of the Cisco ESA email pipeline? (Choose two.)

A.

reject

B.

workqueue

C.

action

D.

delivery

E.

quarantine

Email encryption is configured on a Cisco ESA that uses CRES.

Which action is taken on a message when CRES is unavailable?

A.

It is requeued.

B.

It is sent in clear text.

C.

It is dropped and an error message is sent to the sender.

D.

It is encrypted by a Cisco encryption appliance.

A company has recently updated their security policy and now wants to drop all email messages larger than 100 MB coming from external sources. The Cisco Secure Email Gateway is LDAP integrated and all employee accounts are in the group "Employees". Which filter rule configuration provides the desired outcome?

A.

if (mail-from-group == 'Employees') and (body-size > "100M") {drop()}

B.

if (mail-from-group != 'Employees') and (body-size > 100M) {drop();}

C.

if (mail-from-group == 'Employees') and (body-size > 100M) {bounce();}

D.

if ('mail-from-group != Employees') and (body-size > 100M) {drop();}

When the spam quarantine is configured on the Cisco Secure Email Gateway, which type of query is used to validate non administrative user access to the end-user quarantine via LDAP?

A.

spam quarantine end-user authentication

B.

spam quarantine alias consolidation

C.

spam quarantine external authorization

D.

local mailbox (IMAP/POP) authentication

Which two components form the graymail management solution in Cisco ESA? (Choose two.)

A.

cloud-based unsubscribe service

B.

uniform unsubscription management interface for end users

C.

secure subscribe option for end users

D.

integrated graymail scanning engine

E.

improved mail efficacy

An organization wants to prevent proprietary patent documents from being shared externally via email. The network administrator reviewed the DLP policies on the Cisco Secure Email Gateway and could not find an existing policy with the appropriate matching patterns. Which type of DLP policy template must be used to create a policy that meets this requirement?

A.

privacy protection

B.

custom policy

C.

regulatory compliance

D.

acceptable use

Refer to the exhibit.

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

A.

skip-filters

B.

log-entry

C.

spf-status

D.

quarantine

What are the two different phases in the process of Cisco Secure Email Gateway performing S/MIME encryption? (Choose two.)

A.

Attach the encrypted public key to the message

B.

Encrypt the message body using the session key

C.

Send the encrypted message to the sender

D.

Attach the encrypted symmetric key to the message

E.

Create a pseudo-random session key.

Drag and drop the graymail descriptions from the left onto the verdict categories they belong to on the right.

An organization has a strict policy on URLs embedded in emails. The policy allows visibility into what the URL is but does not allow the user to click it. Which action must be taken to meet the requirements of the security policy?

A.

Enable the URL quarantine policy

B.

Defang the URL.

C.

Replace the URL with text

D.

Redirect the URL to the Cisco security proxy

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

A.

SenderBase Reputation Filtering

B.

Connection Reputation Filtering

C.

Talos Reputation Filtering

D.

SpamCop Reputation Filtering

A company has deployed a new mandate that requires all emails sent externally from the Sales Department to be scanned by DLP for PCI-DSS compliance. A new DLP policy has been created on the Cisco ESA and needs to be assigned to a mail policy named ‘Sales’ that has yet to be created.

Which mail policy should be created to accomplish this task?

A.

Outgoing Mail Policy

B.

Preliminary Mail Policy

C.

Incoming Mail Flow Policy

D.

Outgoing Mail Flow Policy

An email containing a URL passes through the Cisco ESA that has content filtering disabled for all mail policies. The sender is sampleuser@test1.com, the recipients are testuser1@test2.com, testuser2@test2.com, testuser3@test2.com, and mailer1@test2.com. The subject of the email is Test Document395898847. An administrator wants to add a policy to ensure that the Cisco ESA evaluates the web reputation score before permitting this email.

Which two criteria must be used by the administrator to achieve this? (Choose two.)

A.

Subject contains Test Document"

B.

Sender matches test1.com

C.

Email body contains a URL

D.

Date and time of email

E.

Email does not match mailer1@test2.com

An organization wants to use DMARC to improve its brand reputation by leveraging DNS records.

Which two email authentication mechanisms are utilized during this process? (Choose two.)

A.

SPF

B.

DSTP

C.

DKIM

D.

TLS

E.

PKI

What is the default method of remotely accessing a newly deployed Cisco Secure Email Virtual Gateway when a DHCP server is not available?

A.

Manual configuration of an IP address is required through the serial port before remote access

B.

DHCP is required for the initial IP address assignment

C.

Use the IP address of 192.168 42 42 via the Management port

D.

Manual configuration of an IP address is required through the hypervisor console before remote access

What are two primary components of content filters? (Choose two.)

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?

A.

provisioned email encryption profile

B.

message encryption from a content filter that select "Message Encryption" over TLS

C.

message encryption from the mail flow policies with "CRES" selected

D.

content filter to forward the email to the Cisco Registered Envelope server

Page: 2 / 3
Total 147 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved