Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-720 Cisco Securing Email with Cisco Email Security Appliance (300-720 SESA) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Cisco 300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 3
Total 190 questions

When the Cisco ESA is configured to perform antivirus scanning, what is the default timeout value?

A.

30 seconds

B.

90 seconds

C.

60 seconds

D.

120 seconds

An engineer must configure the message source when integrating Cisco Secure Email Threat Defense with Microsoft 365. The integration must allow visibility but not remediation. Drag and drop the actions from the left into sequence on the right to meet the requirement.

An engineer must add the user1@cisco.co m with an IP address of 10.1.1.13 to a safelist in Cisco Secure Email Gateway. Which two safelist syntaxes must be configured to meet the requirement? (Choose two.)

A.

[10.1.1.16/30]

B.

user1@ [10.1.1.13]

C.

[10.1.1.0/24]

D.

[10.1.1.13/30]

Which action is allowed while managing list of certificate authorities on Cisco Secure Email Gateway?

A.

Export the list to the xml file.

B.

Remove the preinstalled list.

C.

Accept the selected certificate list.

D.

Enable the system list.

What are organizations trying to address when implementing a SPAM quarantine?

A.

true positives

B.

false negatives

C.

false positives

D.

true negatives

The security administrator wants to configure alerts on Cisco Secure Email Gateway for outbreak filters. Which two actions must be taken to meet the requirement? (Choose two.)

A.

From Outbreak Filters Global Settings, enable the alerts for the outbreak filters.

B.

Enable the alerts for the outbreak filters by using an Adaptive Rule.

C.

From Mail Policies, configure the Outbreak Filters settings.

D.

From System Administration enable message splintering.

E.

From Security Services, configure the Outbreak Filters settings.

An Encryption Profile has been set up on the Cisco ESA.

Drag and drop the steps from the left for creating an outgoing content filter to encrypt emails that contains the subject " Secure: " into the correct order on the right.

Which content filter condition checks to see if the " From: header " in the message is similar to any of the users in the content dictionary?

A.

Forged Email Detection

B.

SPF Verification

C.

Subject Header

D.

Duplicate Boundaries Verification

Which predefined DLP category must be used by a network administrator to ensure that a company employee cannot send credit card information outside the company?

A.

Company Confidential

B.

Regulatory Compliance

C.

Intellectual Property Protection

D.

Acceptable Use

A network engineer must tighten up the SPAM control policy of an organization due to a recent SPAM attack. In which scenario does enabling regional scanning improve security for this organization?

A.

when most of the received spam comes from a specific country

B.

when most of the received spam originates outside of the U.S.

C.

when most of the received email originates outside of the U.S.

D.

when most of the received email originates from a specific region

Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?

A.

A policy quarantine is missing.

B.

More than one email pipeline is defined.

C.

The " modify the message subject " is already set.

D.

The " add custom header " action is performed first.

What is a valid content filter action?

A.

decrypt on delivery

B.

quarantine

C.

skip antispam

D.

archive

When an email is sent with bounce verification enabled, which address is rewritten by the Cisco Secure Email Gateway in the message?

A.

sender

B.

envelope recipient

C.

recipient

D.

envelope sender

Refer to the exhibit. How does a Cisco Secure Email Gateway handle an email that is identified both as spam positive and outbreak positive by outbreak filters?

A.

The email is sent to outbreak quarantine and is rescanned for spam before being released.

B.

The email is sent only to the outbreak quarantine.

C.

The email is sent to spam quarantine and outbreak quarantine.

D.

The email is sent only to the spam quarantine.

An administrator notices that the Cisco Secure Email Gateway delivery queue on an appliance is consistently full. After further investigation, it is determined that the IP addresses currently in use by appliance are being rate-limited by some destinations. The administrator creates a new interface with an additional IP address using virtual gateway technology, but the issue is not solved Which configuration change resolves the issue?

A.

Use the CLI command altsrchost to set the new interface as the source IP address for all mail.

B.

Use the CLI command loadbalance auto to enable mail delivery over all interfaces.

C.

Use the CLI command alt-src-host to set the new interface as a possible delivery candidate.

D.

Use the CLI command deliveryconfig to set the new interface as the primary interface for mail delivery

What is needed to sign outbound emails using Domain Keys Identified Mail after a signing profile is created in the Cisco Secure Email Gateway?

A.

Configure in destination controls.

B.

Enable DKIM in an outbound content filter.

C.

Enable DKIM in the mail flow policy.

D.

A signing profile referencing the sender domain is sufficient.

What is the maximum message size that can be configured for encryption on the Cisco ESA?

A.

20 MB

B.

25 MB

C.

15 MB

D.

30 MB

Which two factors must be considered when message filter processing is configured? (Choose two.)

A.

message-filter order

B.

lateral processing

C.

structure of the combined packet

D.

mail policies

E.

MIME structure of the message

Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?

A.

SenderBase Reputation Filtering

B.

Connection Reputation Filtering

C.

Talos Reputation Filtering

D.

SpamCop Reputation Filtering

What is the default behavior of any listener for TLS communication?

A.

preferred-verify

B.

off

C.

preferred

D.

required

Page: 1 / 3
Total 190 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved