Cisco 300-720 Exam
Securing Email with Cisco Email Security Appliance (300-720 SESA) (Page 3 )

Updated On: 1-Feb-2026

Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)

  1. Paste in the Registration Token generated from the Smart Licensing Account
  2. Enable the Threat Response service under Network>Cloud Service Settings.
  3. Select the correct Threat Response Server based on your region.
  4. Paste in the Registration Token generated from the Security Services Exchange.
  5. Enable the Security Services Exchange service under Network>Cloud Service Settings

Answer(s): B,C

Explanation:

one of the methods to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance is to use the Threat Response service1. This service allows the appliance to send telemetry data to the SecureX cloud and provide visibility and response capabilities across multiple security products1. To use this service, the administrator needs to perform the following steps1:
Enable the Threat Response service: The administrator needs to go to Network > Cloud Service Settings and enable the Threat Response service. This will generate a registration token that can be used to register the appliance with SecureX1.
Select the correct Threat Response Server: The administrator needs to select the appropriate Threat Response server based on the region where the appliance is located. The available regions are North America, Europe, and Asia Pacific1.



What are the two different phases in the process of Cisco Secure Email Gateway performing S/MIME encryption? (Choose two.)

  1. Attach the encrypted public key to the message
  2. Encrypt the message body using the session key
  3. Send the encrypted message to the sender
  4. Attach the encrypted symmetric key to the message
  5. Create a pseudo-random session key.

Answer(s): D,E



What is the purpose of checking the CRL during SMTP authentication on a Cisco Secure Email Gateway?

  1. Validate the date to check if the certificate is still valid
  2. Check if the certificate is not revoked.
  3. Confirm that corresponding CA is present
  4. Verify the common name matches user ID

Answer(s): B

Explanation:

The purpose of checking the Certificate Revocation List (CRL) during SMTP authentication on a Cisco Secure Email Gateway is to check if the certificate is not revoked by the issuing Certificate Authority (CA). A revoked certificate means that it is no longer valid and should not be trusted. Reference = [User Guide for AsyncOS 12.0 for Cisco Email Security Appliances - GD (General Deployment) - Configuring SMTP Authentication [Cisco Secure Email Gateway] - Cisco]



A Cisco Secure Email Gateway administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange.
Which Connection Behavior must be selected to properly process the messages?

  1. Accept
  2. Delay
  3. Relay
  4. Reject

Answer(s): C

Explanation:

Relay is the connection behavior that must be selected to properly process the messages. Relay allows Cisco ESA to accept messages from the specified source and deliver them to the intended destination, without applying any content or reputation filters. To configure a mail flow policy with relay connection behavior on Cisco ESA, the administrator can follow these steps:
Select Mail Policies > Mail Flow Policies and click Add Policy. Enter a name and description for the mail flow policy, such as Exchange Outbound.
Under Connection Behavior, select Relay.
Click Submit.
The other options are not valid connection behaviors to properly process the messages, because they either reject, delay, or accept the messages with content or reputation filters applied.


Reference:

[User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway], page 6-2 and page 6-3.



When a network engineer is troubleshooting a mail flow issue, they discover that some emails are rejected with an SMTP code of 451 and the error message "#4.7.1 Unable to perform DMARC verification". In the DMARC verification profile on the Cisco Secure Email Gateway appliance, which action must be set for messages that result in temporary failure to prevent these emails from being rejected?

  1. Accept
  2. Ignore
  3. Quarantine
  4. No Action

Answer(s): A

Explanation:

Accept is the action that must be set for messages that result in temporary failure to prevent these emails from being rejected. Accept allows Cisco ESA to deliver the messages without applying any DMARC actions or modifications.
To configure the accept action for messages that result in temporary failure on Cisco ESA, the administrator can follow these steps:
Select Mail Policies > DMARC Verification Profile and click Edit Settings for the DMARC verification profile that applies to the messages.
Under DMARC Actions, select Accept from the drop-down menu for Messages That Result in Temporary Failure.
Click Submit.
The other options are not valid actions for messages that result in temporary failure to prevent these emails from being rejected, because they either apply DMARC actions or modifications or do nothing.


Reference:

[User Guide for AsyncOS 15.0 for Cisco Secure Email Gateway], page 11-4 and page 11-5.



Viewing page 3 of 31
Viewing questions 11 - 15 out of 179 questions



Post your Comments and Discuss Cisco 300-720 exam prep with other Community members:

Join the 300-720 Discussion