Free 300-720 Exam Braindumps

Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?

  1. quarantine threat level
  2. antispam
  3. data loss prevention
  4. antivirus

Answer(s): B

Explanation:

The feature that must be configured before an administrator can use the outbreak filter for nonviral threats is antispam. The outbreak filter relies on the antispam engine to detect and block nonviral threats, such as phishing, malware, or spam campaigns. You need to enable antispam scanning and configure the antispam settings before you can use the outbreak filter.


Reference:

Securing Email with Cisco Email Security Appliance (SESA) v3.1, Module 8: Using Anti- Virus and Outbreak Filters, Lesson 2: Configuring Outbreak Filters

https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/ b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_chapter_01110.html



Which type of attack is prevented by configuring file reputation filtering and file analysis features?

  1. denial of service
  2. zero-day
  3. backscatter
  4. phishing

Answer(s): B

Explanation:

The type of attack that is prevented by configuring file reputation filtering and file analysis features is zero-day. Zero-day attacks are those that exploit unknown vulnerabilities in software or systems before they are patched or fixed. File reputation filtering and file analysis features help to protect against zero-day attacks by checking the reputation of files attached to email messages and sending them to a cloud-based service for dynamic analysis.


Reference:

Securing Email with Cisco Email Security Appliance (SESA) v3.1, Module 9: Using Advanced Malware Protection, Lesson 1: Configuring File Reputation Filtering and File Analysis

https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/ b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_chapter_010000.html#con_1809885



When DKIM signing is configured, which DNS record must be updated to load the DKIM public signing key?

  1. AAAA record
  2. PTR record
  3. TXT record
  4. MX record

Answer(s): C

Explanation:

When DKIM (DomainKeys Identified Mail) signing is configured on Cisco ESA, the DNS record that must be updated to load the DKIM public signing key is the TXT record. The TXT record is used to store arbitrary text information in the DNS, such as the DKIM public key, which can be retrieved by the recipients to verify the DKIM signature in the message header.


Reference:

User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway, page 11-3.

https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/213939- esa- configure-dkim-signing.html



Which attack is mitigated by using Bounce Verification?

  1. spoof
  2. denial of service
  3. eavesdropping
  4. smurf

Answer(s): B

Explanation:

Bounce Verification is a feature that mitigates denial of service attacks on Cisco ESA. A denial of service attack is an attempt to overwhelm a system or network with excessive traffic or requests, rendering it unavailable or slow for legitimate users. Bounce Verification prevents Cisco ESA from accepting bounce messages that are not generated by itself or by trusted hosts, reducing the load on the system and preventing backscatter spam.


Reference:

User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway, page 5-8.

https://www.networkworld.com/article/2305394/ironport-adds-bounce-back- verification-for-e- mail.html






Post your Comments and Discuss Cisco® 300-720 exam with other Community members:

300-720 Discussions & Posts