Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-720 Cisco Securing Email with Cisco Email Security Appliance (300-720 SESA) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Cisco 300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 3
Total 190 questions

An engineer must configure Directory Harvest Attack Prevention for SMTP in Cisco Secure Email Gateway. This error message must be sent when the listener receives more than 50 invalid

recipients per hour.

•500 - Too many requests

•Max. Invalid Recipients Per Hour was set to 50 already.

Which two actions must be taken next to set maximum invalid recipients per hour to meet the requirement? (Choose two.)

A.

Create Max. Recipients Per Hour Code to 500.

B.

Apply Max. Recipients Per Hour Text to 500 - Too many requests.

C.

Configure Max. Recipients Per Hour Code to 500.

D.

Set Max. Recipients Per Hour Text to Too many requests.

E.

Implement Max. Recipients Per Hour Text to 500 - Too many requests.

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

A.

DHAP

B.

SBRS

C.

LDAP

D.

SMTP

What is the purpose of checking the CRL during SMTP authentication on a Cisco Secure Email Gateway?

A.

Validate the date to check if the certificate is still valid

B.

Check if the certificate is not revoked.

C.

Confirm that corresponding CA is present

D.

Verify the common name matches user ID

A network engineer is reviewing the record presented.

Which type of DNS record would contain the record as per the DKIM public key RFC 6376?

A.

MX

B.

PTR

C.

SRV

D.

TXT

An engineer must configure Cisco Secure Email Gateway to scan all email from the HR department for viruses. The Sophos scanning engine must be used, and messages that potentially

still contain viruses after repair must be quarantined. These configurations were performed already:

•Enable antivirus scanning on the email gateway.

•Create a mail policy for the HR department.

Which two actions must be taken to complete the configuration? (Choose two.)

A.

From the Message Scanning settings, enable Scan and Repair Viruses.

B.

Configure Virus Infected Message Handling to quarantine the messages.

C.

From the Message Scanning settings, enable the dropping of attachments.

D.

From the Message Scanning settings, enable Scan for Viruses only.

E.

Configure Unscannable Message Handling to quarantine the messages.

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

A list of company executives is routinely being spoofed, which puts the company at risk of malicious email attacks An administrator must ensure that executive messages are originating from legitimate sending addresses Which two steps must be taken to accomplish this task? (Choose two.)

A.

Create an incoming content filter with SPF detection.

B.

Enable the Forged Email Detection feature under Security Settings.

C.

Enable DMARC feature under Mail Policies.

D.

Create an incoming content filter with the Forged Email Detection condition

E.

Create a content dictionary including a list of the names that are being spoofed.

An organization wants to use DMARC to improve its brand reputation by leveraging DNS records.

Which two email authentica tion mechanisms are utilized during this process? (Choose two.)

A.

SPF

B.

DSTP

C.

DKIM

D.

TLS

E.

PKI

Drag and drop the Cisco ESA reactions to a possible DLP from the left onto the correct action types on the right.

Which action must be taken before a custom quarantine that is being used can be deleted?

A.

Delete the quarantine that is assigned to a filter.

B.

Delete the quarantine that is not assigned to a filter.

C.

Delete only the unused quarantine.

D.

Remove the quarantine from the message action of a filter.

Which cloud service provides a reputation verdict for email messages based on the sender domain and other attributes?

A.

Cisco AppDynamics

B.

Cisco Secure Email Threat Defense

C.

Cisco Secure Cloud Analytics

D.

Cisco Talos

To comply with a recent audit, an engineer must configure anti-virus message handling options on the incoming mail policies to attach warnings to the subject of an email.

What should be configured to meet this requirement for known viral emails?

A.

Virus Infected Messages

B Unscannable Messages

B.

Encrypted Messages

C.

Positively Identified Messages

Which process is skipped when an email is received from safedomain.com, which is on the safelist?

A.

message filter

B.

antivirus scanning

C.

outbreak filter

D.

antispam scanning

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Refer to the exhibit.

An administrator has configured File Reputation and File Analysis on the Cisco Secure Email Gateway appliance however it does not function as expected What must be configured on the appliance for this to function?

A.

Upload the Root CA certificate for the File Reputation cloud to the Cisco Secure Email Gateway.

B.

Open port 443 on the firewall for the Cisco Secure Email Gateway to connect to the File Reputation cloud.

C.

Configure the Cisco Secure Email Gateway to use SSL for the connection to the File Reputation server

D.

Restart the File Reputation service to force the scanning engine to connect to the File Reputation cloud.

An engineer must enable SIDF for a mail flow policy on an incoming listener in Cisco Secure Email Gateway. Drag and drop the actions from the left into the sequence on the right to meet the requirement.

An organization has multiple Cisco Secure Email Gateway appliances deployed, resulting in several spam quarantines to manage. To manage the quarantined messages, the administrator enabled the centralized spam quarantine on the Cisco Secure Email and Web Manager appliance and configured the external spam quarantine on the Cisco Secure Email Gateway appliances. However, messages are still being directed to the local quarantine on the Cisco Secure Email Gateway appliances What change is necessary to complete the configuration?

A.

Modify the incoming mail policies on the Cisco Secure Email Gateway appliances to redirect to the external quarantine

B.

Disable the external spam quarantine on the Cisco Secure Email Gateway appliances

C.

Disable the local spam quarantine on the Cisco Secure Email Gateway appliances.

D.

Modify the external spam quarantine settings on the Cisco Secure Email Gateway appliances and change the port to 25

Page: 3 / 3
Total 190 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved