Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-720 Cisco Securing Email with Cisco Email Security Appliance (300-720 SESA) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Cisco 300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 190 questions

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: < ceo@example com > must be entered. What must be added to the dictionary to accomplish this goal?

A.

example.com

B.

Example CEO

C.

ceo

D.

ceo@example com

Which type of attack is prevented by configuring file reputation filtering and file analysis features?

A.

denial of service

B.

zero-day

C.

backscatter

D.

phishing

When the spam quarantine is configured on the Cisco Secure Email Gateway, which type of query is used to validate non administrative user access to the end-user quarantine via LDAP?

A.

spam quarantine end-user authentication

B.

spam quarantine alias consolidation

C.

spam quarantine external authorization

D.

local mailbox (IMAP/POP) authentication

Which feature must be activated on a Cisco Secure Email Gateway to combat backscatter?

A.

Graymail Detection

B.

Bounce Verification

C.

Forged Email Detection

D.

Bounce Profile

The company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data Users must be able to flag the messages that require encryption versus a Cisco Secure Email Gateway appliance scanning all messages and automatically encrypting via detection Which action enables this capability?

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

What is the default method of remotely accessing a newly deployed Cisco Secure Email Virtual Gateway when a DHCP server is not available?

A.

Manual configuration of an IP address is required through the serial port before remote access

B.

DHCP is required for the initial IP address assignment

C.

Use the IP address of 192.168 42 42 via the Management port

D.

Manual configuration of an IP address is required through the hypervisor console before remote access

The CEO sent an email indicating that all emails containing a string of 123ABCDEFGHJ cannot be delivered and must be sent into quarantine for further inspection. Given the requirement, which regular expression should be used to match on that criteria?

A.

\\D{3}[A-Z]{9}

B.

\d{3}[A-Z]{9}

C.

\W{3}[A-Z]{9}

D.

{3}\d{9}[A-Z]

When a network engineer is troubleshooting a mail flow issue, they discover that some emails are rejected with an SMTP code of 451 and the error message " #4.7.1 Unable to perform DMARC verification " . In the DMARC verification profile on the Cisco Secure Email Gateway appliance, which action must be set for messages that result in temporary failure to prevent these emails from being rejected?

A.

Accept

B.

Ignore

C.

Quarantine

D.

No Action

An administrator manipulated the subnet mask but was still unable to access the user interface. How must the administrator access the Cisco Secure Email Gateway appliance to perform the initial configuration?

A.

Use the serial or console port

B.

Use the management port

C.

Use the data 2 port

D.

Use the data 1 port

Which SMTP extension does Cisco ESA support for email security?

A.

ETRN

B.

UTF8SMTP

C.

PIPELINING

D.

STARTTLS

An engineer must modify the altsrchost table on a Cisco Secure Email Gateway Messages destined for a domain named @cisco.com must be mapped to Newlnterface with an IP address of 10.10.10.1. What must be added to the table?

A.

Newlnterface @cisco.com

B.

Cisco com® 10.10.10.1

C.

@cisco.com Newlnterface

D.

cisco.com® Newlnterface

Refer to the exhibit. How does the Cisco Secure Email Gateway handle an email with an unknown Microsoft Word document?

A.

The email is quarantined.

B.

The email is dropped.

C.

The file is sent to the cloud for file analysis.

D.

The email is delivered without file analysis.

Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?

A.

Add an additional mapping for attachment type for zip files.

B.

Enable assume match pattern if the email was not scanned for any reason.

C.

Increase the maximum recursion depth from 5 to a larger value.

D.

Increase the maximum attachment size to scan to a larger value.

A security administrator deployed a Cisco Secure Email Gateway appliance with a mail policy configured to store suspected spam for review. The appliance is the DMZ and only the standard HTTP/HTTPS ports are allowed by the firewall. An administrator wants to ensure that users can view any suspected spam that was blocked. Which action must be taken to meet this requirement?

A.

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

B.

Enable the Spam Quarantine and leave the default settings unchanged.

C.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

D.

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

An engineer must add cisco.com to the listed domains in Cisco Secure Email Gateway that accept messages. All other domains must be blocked, and the message must be sent back to the sender is Domain Blocked. Which two actions must be taken to meet the requirement? (Choose two.)

A.

From the IP Reputation Filtering settings, accept Cisco com and reject all other URLs

B.

From the Sender Domain Reputation Filtering settings, accept Cisco com and reject all other URLs.

C.

Configure Domain blocked as a custom threat response.

D.

Accept Cisco com and reject all other URLs in the Recipient Access Table.

E.

Configure Domain blocked as a custom SMTP response

Which setting affects the aggressiveness of spam detection?

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Which two are configured in the DMARC verification profile? (Choose two.)

A.

name of the verification profile

B.

minimum number of signatures to verify

C.

ESA listeners to use the verification profile

D.

message action into an incoming or outgoing content filter

E.

message action to take when the policy is reject/quarantine

An engineer is tasked with creating a content filter to catch attachments, including credit card numbers, and hold them for review until further action is taken. Which component on a Cisco Secure Email Gateway must be configured to meet this requirement?

A.

Spam Quarantine

B.

Policy Quarantine

C.

Outbreak Filter

D.

Content Filter

A trusted partner of an organization recently experienced a new campaign that was leveraging JavaScript attachments to trick users into executing malware. As a result, they created a local policy to deny messages with JavaScript attachments. Which action should the administrator of the organization take to ensure encrypted communications are delivered to the intended partner recipient?

A.

Insert the X-PostX-Use-Script ' header with a value of false to the encrypted messages

B.

Select JavaScript-free ' option within the Cisco Secure Email Encryption Service Add-in

C.

Create an outgoing content filter and add the Encrypt and Deliver Nov/ action with Use-Script option deselected

D.

Create a new encryption profile and deselect the ' Use-Script ' envelope settings option.

Page: 2 / 3
Total 190 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved