DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Enhance Your Cisco 300-720 SESA Exam Readiness with Practice Tests

Prepare for success in the Cisco Data Center certification journey with our real Cisco 300-720 SESA exam questions. Our comprehensive collection of exam resources includes practice tests, a practice exam, and expertly crafted exam questions and answers to enhance your exam preparation. With our study material, you'll gain valuable insights into test questions and develop the skills needed to successfully pass the Cisco 300-720 SESA exam. Each question is designed to mirror the complexity and format of the actual exam, ensuring that you're well-equipped to tackle any challenge that comes your way. Utilize our exam resources to streamline your exam preparation process and boost your confidence on exam day. Whether you're reviewing concepts or testing your knowledge, our exam questions are the perfect tool to help you achieve Cisco Data Center certification. Maximize your chances of success and excel in your certification journey with our trusted exam resources. Start preparing today and take the first step towards becoming a certified Cisco professional.
Take other online exams

Question #1
Which benefit does enabling external spam quarantine on Cisco SMA provide?
A. bility to back up spam quarantine from multiple Cisco ESAs to one central console
B. ccess to the spam quarantine interface on which a user can release, duplicate, or delete
C. bility to scan messages by using two engines to increase a catch rate
D. bility to consolidate spam quarantine data from multiple Cisco ESA to one central console
View answer
Correct Answer: D
Question #2
Which antispam feature is utilized to give end users control to allow emails that are spam to be delivered to their inbox, overriding any spam verdict and action on the Cisco ESA?
A. nd user allow list
B. nd user spam quarantine access
C. nd user passthrough list
D. nd user safelist
View answer
Correct Answer: B
Question #3
Which feature must be activated on a Cisco Secure Email Gateway to combat backscatter?
A. raymail Detection
B. ounce Verification
C. orged Email Detection
D. ounce Profile
View answer
Correct Answer: B
Question #4
Which type of query must be configured when setting up the Spam Quarantine while merging notifications?
A. pam Quarantine Alias Routing Query
B. pam Quarantine Alias Consolidation Query
C. pam Quarantine Alias Authentication Query
D. pam Quarantine Alias Masquerading Query
View answer
Correct Answer: B
Question #5
An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)
A. omains
B. enders
C. eputation score
D. eceivers
E. pf check
View answer
Correct Answer: AB
Question #6
09. Which action must be taken before a custom quarantine that is being used can be deleted?
A. eletethequarantinethatisassignedtoafilte
B. emovethequarantinefromthemessageactionofafilte
C. eleteonlytheunusedquarantine
D. eletethequarantinethatisnotassignedtoafilte
View answer
Correct Answer: B
Question #7
Which attack is mitigated by using Bounce Verification?
A. poof
B. enial of service
C. avesdropping
D. murf
View answer
Correct Answer: B
Question #8
Which SMTP extension does Cisco ESA support for email security?
A. TRN
B. TF8SMTP
C. IPELINING
D. TARTTLS
View answer
Correct Answer: D
Question #9
Which process is skipped when an email is received from safedomain.com, which is on the safelist?
A. essage filter
B. ntivirus scanning
C. utbreak filter
D. ntispam scanning
View answer
Correct Answer: A
Question #10
01. What is the default HTTPS port when configuring spam quarantine on Cisco ESA?
A. 3
B. 2
C. 43
D. 0
View answer
Correct Answer: A
Question #11
What is a benefit of deploying Cisco SMA?
A. centralized management of logs for Cisco ESA appliances
B. centralized management of botnet directories
C. centralized management of software updates for Cisco ESA appliances
D. centralized management of quarantined email
View answer
Correct Answer: C
Question #12
DRAG DROP (DRAG AND DROP IS NOT SUPPORTED)Drag and drop the Cisco ESA reactions to a possible DLP from the left onto the correct action types on the right.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #13
Email encryption is configured on a Cisco ESA that uses CRES. Which action is taken on a message when CRES is unavailable?
A. t is requeued
B. t is sent in clear text
C. t is dropped and an error message is sent to the sender
D. t is encrypted by a Cisco encryption appliance
View answer
Correct Answer: B
Question #14
An administrator notices that the Cisco ESA delivery queue is consistently full. After further investigation, it is determined that the IP addresses currently in use by the Cisco ESA are being rate-limited by some destinations. The administrator creates a new interface with an additional IP address using virtual gateway technology, but the issue is not solved. Which configuration change resolves the issue?
A. Use the CLI command alt-src-host to set the new interface as a possible delivery candidate
B. Use the CLI command loadbalance auto to enable mail delivery over all interfaces
C. Use the CLI command deliveryconfig to set the new interface as the primary interface for mail delivery
D. Use the CLI command altsrchost to set the new interface as the source IP address for all mail
View answer
Correct Answer: B
Question #15
Refer to the exhibit. How should this configuration be modified to stop delivering Zero Day malware attacks?
A. Change Unscannable Action from Deliver As Is to Quarantine
B. Change File Analysis Pending action from Deliver As Is to Quarantine
C. Configure mailbox auto-remediation
D. Apply Prepend on Modify Message Subject under Malware Attachments
View answer
Correct Answer: C
Question #16
An administrator needs to configure a Cisco ESA to block specific domains based on their reputation. Which service within the Cisco ESA should be utilized to accomplish this task?
A. Receiving SMTP Policy
B. Data Loss Prevention
C. Anti-Virus
D. Sender Group
View answer
Correct Answer: A
Question #17
An engineer wants to ensure that emails received by company users that contain URLs do not make them susceptible to data loss from accessing malicious or undesired external content sources Which two features must be configured on Cisco Secure Email Gateway to meet this requirement1? (Choose two.)
A. ntispam scanning
B. ata loss prevention
C. raymail detection
D. RL filtering
E. ntivirus scanning
View answer
Correct Answer: AD
Question #18
Which two configurations are used on multiple LDAP servers to connect with Cisco ESA? (Choose two.)
A. 025
B. 443
C. 025
D. 443
View answer
Correct Answer: AD
Question #19
04. How does the graymail safe unsubscribe feature function?
A. tstripsthemaliciouscontentoftheURIbeforeunsubscribi
B. tcheckstheURIreputationandcategoryandallowsthecontentfiltertotakeanactiononi
C. tredirectstheenduserwhoclickstheunsubscribebuttontoasandboxenvironmenttoallowasafeunsubscribe
D. tchecksthereputationoftheURIandperformstheunsubscribeprocessonbehalfoftheenduse
View answer
Correct Answer: D
Question #20
What is the maximum message size that can be configured for encryption on the Cisco ESA?
A. 0 MB
B. 5 MB
C. 5 MB
D. 0 MB
View answer
Correct Answer: A
Question #21
How does the graymail safe unsubscribe feature function?
A. et up the interface group with the flag
B. ssue the altsrchost command
C. ap the envelope sender address to the host
D. pply a filter on the message
View answer
Correct Answer: D
Question #22
What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?
A. ee Explanation section for answer
View answer
Correct Answer: C
Question #23
When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?
A. nabling the End-User Safelist/Blocklist feature
B. pam Quarantine External Authentication Query
C. pam Quarantine End-User Authentication Query
D. pam Quarantine Alias Consolidation Query
View answer
Correct Answer: C
Question #24
Which SMTP extension does Cisco ESA support for email security?
A. TRN
B. TF8SMTP
C. IPELINING
D. TARTTLS
View answer
Correct Answer: D
Question #25
03. When the Cisco ESA is configured to perform antivirus scanning, what is the default timeout value?
A. 0second
B. 0second
C. 0second
D. 20second
View answer
Correct Answer: C
Question #26
Which two factors must be considered when message filter processing is configured? (Choose two.)
A. t strips the malicious content of the URI before unsubscribing
B. t checks the URI reputation and category and allows the content filter to take an action on it
C. t redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe
D. t checks the reputation of the URI and performs the unsubscribe process on behalf of the end user
View answer
Correct Answer: AE
Question #27
A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.What is the reason of this?
A. The “From” header is checked against all policies in a top-down fashion
B. The message header with the highest priority is checked against each policy in a top-down fashion
C. The “To” header is checked against all policies in a top-down fashion
D. The message header with the highest priority is checked against the Default policy in a top-down fashion
View answer
Correct Answer: D
Question #28
An analyst creates a new content dictionary to use with Forged Email Detection. Which entry will be added into the dictionary?
A. ycompany
B. lpha Beta
C. Alpha\\ Beta$
D. lpha
View answer
Correct Answer: A
Question #29
A Cisco ESA administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?
A. Delay
B. Accept
C. Relay
D. Reject
View answer
Correct Answer: C
Question #30
Which Cisco ESA security service is configured only through an outgoing mail policy?
A. ntivirus
B. LP
C. utbreak Filters
D. MP
View answer
Correct Answer: B
Question #31
When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)
A. rotection level
B. pam threshold
C. pam timeout
D. aximum depth of recursion scan
View answer
Correct Answer: AC
Question #32
An administrator manipulated the subnet mask but was still unable to access the user interface. How must the administrator access the appliance to perform the initial configuration?
A. Use the data 2 port
B. Use the serial or console port
C. Use the data 1 port
D. Use the management port
View answer
Correct Answer: B
Question #33
Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)
A. referred-verify
B. ff
C. referred
D. equired
View answer
Correct Answer: CD
Question #34
Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?
A. uarantine threat level
B. ntispam
C. ata loss prevention
D. ntivirus
View answer
Correct Answer: B
Question #35
An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco ES
A. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two
B. domains
C. reputation score
D. spf check
E. senders
View answer
Correct Answer: CE
Question #36
Which benefit does enabling external spam quarantine on Cisco SMA provide?
A. bility to back up spam quarantine from multiple Cisco ESAs to one central console
B. ccess to the spam quarantine interface on which a user can release, duplicate, or delete
C. bility to scan messages by using two engines to increase a catch rate
D. bility to consolidate spam quarantine data from multiple Cisco ESA to one central console
View answer
Correct Answer: D
Question #37
06. What are two prerequisites for implementing undesirable URL protection in Cisco ESA?
A. nableoutbreakfilte
B. nableemailrelay
C. nableantispamscanni
D. nableportbounci
View answer
Correct Answer: AC
Question #38
When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)
A. rovisioned email encryption profile
B. essage encryption from a content filter that select "Message Encryption" over TLS
C. essage encryption from the mail flow policies with "CRES" selected
D. ontent filter to forward the email to the Cisco Registered Envelope server
View answer
Correct Answer: AD
Question #39
08. What occurs when configuring separate incoming mail policies?
A. essagesplinteri
B. essageexcepti
C. essagedetachme
D. essageaggregati
View answer
Correct Answer: A
Question #40
What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)
A. ee Explanation section for answer
View answer
Correct Answer: AC
Question #41
Which action must be taken before a custom quarantine that is being used can be deleted?
A. elete the quarantine that is assigned to a filter
B. elete the quarantine that is not assigned to a filter
C. elete only the unused quarantine
D. emove the quarantine from the message action of a filter
View answer
Correct Answer: D
Question #42
Which type of attack is prevented by configuring file reputation filtering and file analysis features?
A. enial of service
B. ero-day
C. ackscatter
D. hishing
View answer
Correct Answer: B
Question #43
An administrator identifies that, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.Which feature on Cisco ESA should be used to achieve this?
A. incoming mail policies
B. safelist
C. blocklist
D. S/MIME Sending Profile
View answer
Correct Answer: A
Question #44
10. Which two features are applied to either incoming or outgoing mail policies?
A. ndicationofCompromise
B. pplicationfilteri
C. utbreakfilte
D. enderreputationfilteri
View answer
Correct Answer: C
Question #45
05. Which type of attack is prevented by configuring file reputation filtering and file analysis features?
A. enialofservice
B. ero-day
C. ackscatte
D. hishi
View answer
Correct Answer: B
Question #46
Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?
A. enderBase Reputation Filtering
B. onnection Reputation Filtering
C. alos Reputation Filtering
D. pamCop Reputation Filtering
View answer
Correct Answer: A
Question #47
07. Which process is skipped when an email is received from safedomain.com, which is on the safelist?
A. utbreakfilte
B. ntivirusscanni
C. essagefilte
D. ntispamscanni
View answer
Correct Answer: D
Question #48
Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?
A. asic Authentication
B. o Authentication
C. icrosoft 365 Authentication
D. isco Security Cloud Sign On
View answer
Correct Answer: B
Question #49
Refer to the exhibit. An engineer is trying to connect to a Cisco ESA using SSH and has been unsuccessful. Upon further inspection, the engineer notices that there is a loss of connectivity to the neighboring switch.Which connection method should be used to determine the configuration issue?
A. Telnet
B. HTTPS
C. Ethernet
D. serial
View answer
Correct Answer: D
Question #50
DRAG DROP (DRAG AND DROP IS NOT SUPPORTED)An Encryption Profile has been set up on the Cisco ES
A. rag and drop the steps from the left for creating an outgoing content filter to encrypt emails that contains the subject "Secure:" into the correct order on the right
View answer
Correct Answer: A
Question #51
An administrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.How is this accomplished?
A. Disable the VOF feature before sending SPAM to the external quarantine
B. Configure a mail policy to determine whether the message is sent to the local or external quarantine
C. Disable the local quarantine before sending SPAM to the external quarantine
D. Configure a user policy to determine whether the message is sent to the local or external quarantine
View answer
Correct Answer: B
Question #52
To comply with a recent audit, an engineer must configure anti-virus message handling options on the incoming mail policies to attach warnings to the subject of an email.What should be configured to meet this requirement for known viral emails?
A. Virus Infected Messages
B. Unscannable Messages
C. Encrypted Messages
D. Positively Identified Messages
View answer
Correct Answer: C
Question #53
Which feature utilizes sensor information obtained from Talos intelligence to filter email servers connecting into the Cisco ESA?
A. enderBase Reputation Filtering
B. onnection Reputation Filtering
C. alos Reputation Filtering
D. pamCop Reputation Filtering
View answer
Correct Answer: A
Question #54
When DKIM signing is configured, which DNS record must be updated to load the DKIM public signing key?
A. AAA record
B. TR record
C. XT record
D. X record
View answer
Correct Answer: C
Question #55
02. An administrator is trying to enable centralized PVO but receives the error, "Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters / DLP actions available at a level different from the cluster level."
A. ontentfiltersareconfiguredatthemachine-levelonesa1
B. LPisconfiguredatthecluster-levelonesa2
C. LPisconfiguredatthedomain-levelonesa1
D. LPisnotconfiguredonhost1
View answer
Correct Answer: D
Question #56
An administrator is trying to enable centralized PVO but receives the error, "Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters/ DLP actions available at a level different from the cluster level." What is the cause of this error?
A. ontent filters are configured at the machine-level on esa1
B. LP is configured at the cluster-level on esa2
C. LP is configured at the domain-level on esa1
D. LP is not configured on host1
View answer
Correct Answer: D
Question #57
What is a benefit of enabling external SPAM quarantine on Cisco SMA?
A. It provides access to the SPAM quarantine interface on which a user can release, duplicate, or delete
B. It provides the ability to scan messages by using two engines to increase a catch rate
C. It provides the ability to consolidate SPAM quarantine data from multiple Cisco ESAs to one central console
D. It provides the ability to back up SPAM quarantine from multiple Cisco ESAs to one central console
View answer
Correct Answer: C
Question #58
What is the order of virus scanning when multilayer antivirus scanning is configured?
A. he default engine scans for viruses first and the McAfee engine scans for viruses second
B. he Sophos engine scans for viruses first and the McAfee engine scans for viruses second
C. he McAfee engine scans for viruses first and the default engine scans for viruses second
D. he McAfee engine scans for viruses first and the Sophos engine scans for viruses second
View answer
Correct Answer: C
Question #59
A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?
A. on-Viral threat detection requires Antivirus or AMP enablement to properly function
B. he Outbreak Filters option Graymail Header must be enabled
C. on-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function
D. he Outbreak Filters option URL Rewriting must be enabled
View answer
Correct Answer: C
Question #60
Which suboption must be selected when LDAP is configured for Spam Quarantine End-User Authentication?
A. esignate as the active query
B. pdate Frequency
C. erver Priority
D. ntity ID
View answer
Correct Answer: A
Question #61
When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?
A. nabling the End-User Safelist/Blocklist feature
B. pam Quarantine External Authentication Query
C. pam Quarantine End-User Authentication Query
D. pam Quarantine Alias Consolidation Query
View answer
Correct Answer: C
Question #62
Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)
A. essage splintering
B. essage exceptions
C. essage detachment
D. essage aggregation
View answer
Correct Answer: AD
Question #63
An engineer is testing mail flow on a new Cisco ESA and notices that messages for domain abc.com are stuck in the delivery queue. Upon further investigation, the engineer notices that the messages pending delivery are destined for 192.168.1.11, when they should instead be routed to 192.168.1.10.What configuration change needed to address this issue?
A. Add an address list for domain abc
B. Modify Destination Controls entry for the domain abc
C. Modify the SMTP route for the domain and change the IP address to 192
D. Modify the Routing Tables and add a route for IP address to 192
View answer
Correct Answer: C
Question #64
A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key.Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)
A. message-ID
B. sender
C. URL reputation
D. from
E. mail-from
View answer
Correct Answer: BD
Question #65
Which two query types are available when an LDAP profile is configured? (Choose two.)
A. DAP Query
B. MTP AUTH
C. MTP TLS
D. DAP BIND
View answer
Correct Answer: DE

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: