Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-720 Cisco Securing Email with Cisco Email Security Appliance (300-720 SESA) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 3
Total 147 questions

Which restriction is in place for end users accessing the spam quarantine on Cisco Secure Email Gateway appliances?

A.

Access via a link in a notification is mandatory.

B.

The end user must be assigned to the Guest role

C.

Direct access via web browser requires authentication.

D.

Authentication is required when accessing via a link in a notification.

Refer to the exhibit.

An administrator has configured File Reputation and File Analysis on the Cisco Secure Email Gateway appliance however it does not function as expected What must be configured on the appliance for this to function?

A.

Upload the Root CA certificate for the File Reputation cloud to the Cisco Secure Email Gateway.

B.

Open port 443 on the firewall for the Cisco Secure Email Gateway to connect to the File Reputation cloud.

C.

Configure the Cisco Secure Email Gateway to use SSL for the connection to the File Reputation server

D.

Restart the File Reputation service to force the scanning engine to connect to the File Reputation cloud.

A Cisco ESA administrator was notified that a user was not receiving emails from a specific domain. After reviewing the mail logs, the sender had a negative sender-based reputation score.

What should the administrator do to allow inbound email from that specific domain?

A.

Create a new inbound mail policy with a message filter that overrides Talos.

B.

Ask the user to add the sender to the email application's allow list.

C.

Modify the firewall to allow emails from the domain.

D.

Add the domain into the allow list.

Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)

A.

accept

B.

relay

C.

delay

D.

route

E.

reject

Refer to the exhibit.

Which configuration allows the Cisco Secure Email Gateway to scan for executables inside the archive file and apply the action as per the content filter?

A.

Configure the recursion depth to a higher value.

B.

Modify the content filter to look for attachment filetype of compressed.

C.

Configure the maximum attachment size to a higher value.

D.

Modify the content filter to look for exe filename instead of executable filetype.

Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.)

A.

The filters command executed from the CLI is used to configure the message filters.

B.

Message filters configuration within the web user interface is located within Incoming Content Filters.

C.

The filterconfig command executed from the CLI is used to configure message filters.

D.

Message filters can be configured only from the CLI.

E.

Message filters can be configured only from the web user interface.

An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Cisco ESA should be used to achieve this?

A.

incoming mail policies

B.

safelist

C.

blocklist

D.

S/MIME Sending Profile

A Cisco Secure Email Gateway appliance is processing many messages that are sent to invalid recipients verification. Which two steps are required to accomplish this task? (Choose two.)

A.

Enable external LDAP authentication

B.

Configure the LDAP query on a listener

C.

Configure LDAP server profiles

D.

Enable LDAP authentication on a listener

E.

Configure incoming mail policy to query LDAP server

Which two components must be configured to perform DLP scanning? (Choose two.)

A.

Add a DLP policy on the Incoming Mail Policy.

B.

Add a DLP policy to the DLP Policy Manager.

C.

Enable a DLP policy on the Outgoing Mail Policy.

D.

Enable a DLP policy on the DLP Policy Customizations.

E.

Add a DLP policy to the Outgoing Content Filter.

An engineer is configuring a Cisco ESA for the first time and needs to ensure that any email traffic coming from the internal SMTP servers is relayed out through the Cisco ESA and is tied to the Outgoing Mail Policies.

Which Mail Flow Policy setting should be modified to accomplish this goal?

A.

Exception List

B.

Connection Behavior

C.

Bounce Detection Signing

D.

Reverse Connection Verification

An administrator has created a content filter to quarantine all messages that result in an SPF hardfail to review the messages and determine whether a trusted partner has accidentally misconfigured the DNS settings. The administrator sets the policy quarantine to release the messages after 24 hours, allowing time to review while not interrupting business.

Which additional option should be used to help the end users be aware of the elevated risk of interacting with these messages?

A.

Notify Recipient

B.

Strip Attachments

C.

Notify Sender

D.

Modify Subject

Which attack is mitigated by using Bounce Verification?

A.

spoof

B.

denial of service

C.

eavesdropping

D.

smurf

What is the maximum message size that can be configured for encryption on the Cisco ESA?

A.

20 MB

B.

25 MB

C.

15 MB

D.

30 MB

Which action on the Cisco ESA provides direct access to view the safelist/blocklist?

A.

Show the SLBL cache on the CLI.

B.

Monitor Incoming/Outgoing Listener.

C.

Export the SLBL to a .csv file.

D.

Debug the mail flow policy.

An engineer is tasked with creating a content filter to catch attachments, including credit card numbers, and hold them for review until further action is taken. Which component on a Cisco Secure Email Gateway must be configured to meet this requirement?

A.

Spam Quarantine

B.

Policy Quarantine

C.

Outbreak Filter

D.

Content Filter

Which Cisco ESA security service is configured only through an outgoing mail policy?

A.

antivirus

B.

DLP

C.

Outbreak Filters

D.

AMP

A security administrator deployed a Cisco Secure Email Gateway appliance with a mail policy configured to store suspected spam for review. The appliance is the DMZ and only the standard HTTP/HTTPS ports are allowed by the firewall. An administrator wants to ensure that users can view any suspected spam that was blocked. Which action must be taken to meet this requirement?

A.

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

B.

Enable the Spam Quarantine and leave the default settings unchanged.

C.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

D.

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

Which setting affects the aggressiveness of spam detection?

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?

A.

Enable the DKIM service checker

B.

Export the DNS TXT record to provide to the DNS registrar

C.

Import the DNS record of the service provider into the Cisco Secure Email Gateway.

D.

Configure the Trusted Sender Group message authenticity policy.

Which two are configured in the DMARC verification profile? (Choose two.)

A.

name of the verification profile

B.

minimum number of signatures to verify

C.

ESA listeners to use the verification profile

D.

message action into an incoming or outgoing content filter

E.

message action to take when the policy is reject/quarantine

Page: 1 / 3
Total 147 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved