Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

300-720 Securing Email with Cisco Email Security Appliance (300-720 SESA) Questions and Answers

Questions 4

Refer to the exhibit. What is the correct order of c ommands to set filter 2 to active?

Options:

A.

filters- > edit- > 2- > Active

B.

filters- > modify- > All- > Active

C.

filters- > detail- > 2- > 1

D.

filters- > set- > 2- > 1

Buy Now
Questions 5

Which predefined DLP category must be used by a network administrator to ensure that a company employee cannot send credit card information outside the company?

Options:

A.

Company Confidential

B.

Regulatory Compliance

C.

Intellectual Property Protection

D.

Acceptable Use

Buy Now
Questions 6

Which setting affects the aggressiveness of spam detection?

Options:

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Buy Now
Questions 7

Which content filter condition checks to see if the " From: header " in the message is similar to any of the users in the content dictionary?

Options:

A.

Forged Email Detection

B.

SPF Verification

C.

Subject Header

D.

Duplicate Boundaries Verification

Buy Now
Questions 8

What is a benefit of graymail services?

Options:

A.

provides the option to unsubscribe from unwanted marketing emails

B.

removes spam based on the sender email address

C.

provides a safe method to subscribe to social network emails

D.

offers cloud and on-site unsubscription service

Buy Now
Questions 9

Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?

Options:

A.

quarantine threat level

B.

antispam

C.

data loss prevention

D.

antivirus

Buy Now
Questions 10

Which functionality is impacted if the assigned certificate under one of the IP interfaces is modified?

Options:

A.

traffic between the Cisco Secure Email Gateway and the LDAP server

B.

emails being delivered from the Cisco Secure Email Gateway

C.

HTTPS traffic when connecting to the web user interface of the Cisco Secure Email Gateway

D.

emails being received by the Cisco Secure Email Gateway

Buy Now
Questions 11

Which feature must be activated on a Cisco Secure Email Gateway to combat backscatter?

Options:

A.

Graymail Detection

B.

Bounce Verification

C.

Forged Email Detection

D.

Bounce Profile

Buy Now
Questions 12

What is the purpose of checking the CRL during SMTP authentication on a Cisco Secure Email Gateway?

Options:

A.

Validate the date to check if the certificate is still valid

B.

Check if the certificate is not revoked.

C.

Confirm that corresponding CA is present

D.

Verify the common name matches user ID

Buy Now
Questions 13

What is the default HTTPS port when configuring spam quarantine on Cisco ESA?

Options:

A.

83

B.

82

C.

443

D.

80

Buy Now
Questions 14

Which suboption must be selected when LDAP is configured for Spam Quarantine End-User Authentication?

Options:

A.

Designate as the active query

B.

Update Frequency

C.

Server Priority

D.

Entity ID

Buy Now
Questions 15

Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?

Options:

A.

A policy quarantine is missing.

B.

More than one email pipeline is defined.

C.

The " modify the message subject " is already set.

D.

The " add custom header " action is performed first.

Buy Now
Questions 16

A Cisco ESA administrator has several mail policies configured. While testing policy match using a specific sender, the email was not matching the expected policy.

What is the reason of this?

Options:

A.

The Tram* header is checked against all policies in a top-down fashion.

B.

The message header with the highest priority is checked ag ainst each policy in a top-down fashion.

C.

The To " header is checked against all policies in a top-down fashion.

D.

The message header with the highest priority is checked against the Default policy in a top-down fashion.

Buy Now
Questions 17

A network administrator enabled McAfee antivirus scanning on a Cisco Secure Email Gateway and configured the virus scanning action of " scan for viruses only " If the scanner finds a virus in an attachment for an incoming email, what action will be applied to this message?

Options:

A.

The email and attachment are forwarded to the network administrator.

B.

No repair is attempted, and the attachment is either dropped or delivered

C.

The attachment is dropped and replaced with a " Removed Attachment " file

D.

The system will attempt to repair the attachment

Buy Now
Questions 18

An engineer must configure Directory Harvest Attack Prevention for SMTP in Cisco Secure Email Gateway. This error message must be sent when the listener receives more than 50 invalid

recipients per hour.

•500 - Too many requests

•Max. Invalid Recipients Per Hour was set to 50 already.

Which two actions must be taken next to set maximum invalid recipients per hour to meet the requirement? (Choose two.)

Options:

A.

Create Max. Recipients Per Hour Code to 500.

B.

Apply Max. Recipients Per Hour Text to 500 - Too many requests.

C.

Configure Max. Recipients Per Hour Code to 500.

D.

Set Max. Recipients Per Hour Text to Too many requests.

E.

Implement Max. Recipients Per Hour Text to 500 - Too many requests.

Buy Now
Questions 19

An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)

An engineer tries to implement phishing simulations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simulations to bypass antispam scanning? (Choose two.)

Options:

Buy Now
Questions 20

What is the function of authenticating SMTP sessions using client certificates?

Options:

A.

Users must configure a mail client to send messages through a secure SSL connection and accept a server certificate from the appliance.

B.

If the certificate is valid, the Secure Email Gateway allows an SMTP connection from the mail client over TLS.

C.

If the Secure Email Gateway is configured to require users to provide a certificate when sending mail, no exceptions are allowed for any users.

D.

The Secure Email Gateway requests a client certificate from a user ' s mail client during connection to the appliance.

Buy Now
Questions 21

Refer to the exhibit. A security engineer must configure a Cisco Secure Email Gateway to ensure that encryption is enabled and the configured profile is provisioned. Which command must be used?

Options:

A.

setup

B.

check encryption

C.

provision

D.

profiles

Buy Now
Questions 22

Which two configurations are used on multiple LDAP servers to connect with Cisco ESA? (Choose two.)

Options:

A.

load balancing

B.

SLA monitor

C.

active-standby

D.

failover

E.

active-active

Buy Now
Questions 23

Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?

Options:

A.

DER certificate and matching public key from a CA

B.

self-signed certificate in PKCS#7 format

C.

X. 509 certificate and matching private key from a CA

D.

self-signed certificate in PKCS#12 format

Buy Now
Questions 24

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

Options:

A.

DHAP

B.

SBRS

C.

LDAP

D.

SMTP

Buy Now
Questions 25

Which two factors must be considered when message filter processing is configured? (Choose two.)

Options:

A.

message-filter order

B.

lateral processing

C.

structure of the combined packet

D.

mail policies

E.

MIME structure of the message

Buy Now
Questions 26

An engineer must configure a mail policy for all incoming email that contains a Microsoft Excel attachment. All such email must be quarantined without any exception. After the incoming mail policy is created, which action must be taken next to meet the requirement?

Options:

A.

Set the quarantine threat level threshold to 1.

B.

Configure the Outgoing Content Filters settings.

C.

Set the quarantine threat level threshold to 5.

D.

Create an incoming content filter to match required attachments.

Buy Now
Questions 27

Refer to the exhibit.

Which SPF record is valid for mycompany.com?

Options:

A.

v=spf1 a mx ip4:199.209.31.2 -all

B.

v=spf1 a mx ip4:10.1.10.23 -all

C.

v=spf1 a mx ip4:199.209.31.21 -all

D.

v=spf1 a mx ip4:172.16.18.230 -all

Buy Now
Questions 28

Refer to the exhibit.

Which configuration allows the Cisco Secure Email Gateway to scan for executables inside the archive file and apply the action as per the content filter?

Options:

A.

Configure the recursion depth to a higher value.

B.

Modify the content filter to look for attachment filetype of compressed.

C.

Configure the maximum attachment size to a higher value.

D.

Modify the content filter to look for exe filename instead of executable filetype.

Buy Now
Questions 29

An admin istrator is managing multiple Cisco ESA devices and wants to view the quarantine emails from all devices in a central location.

How is this accomplished?

Options:

A.

Disable the VOF feature before sending SPAM to the external quarantine.

B.

Configure a mail p olicy to determine whether the message is sent to the local or external quarantine.

C.

Disable the local quarantine before sending SPAM to the external quarantine.

D.

Configure a user policy to determine whether the message is sent to the local or exte rnal quarantine.

Buy Now
Questions 30

Which two action types are performed by Cisco ESA message filters? (Choose two.)

Options:

A.

non-final actions

B.

filter actions

C.

discard actions

D.

final actions

E.

quarantine actions

Buy Now
Questions 31

A company ' s CFO is requesting the email administrator create an exception for graymail from a certain yoga studio ' s weekly newsletter. Which category of graymail does this fall under?

Options:

A.

Mass

B.

Marketing

C.

Social Network

D.

Sales

Buy Now
Questions 32

A security engineer wants to ensure that legitimate emails from info@partners.com are not quarantined as spam in Cisco Secure Email. Which action must be taken to meet this requirement?

Options:

A.

Remove the domain from the Wocklist.

B.

Add the domain to the allowlist.

C.

Add the domain to the safelist.

D.

Add all partners.com email addresses to the allowlist.

Buy Now
Questions 33

An engineer is testing mail flow on a new Cisco ESA and notices that messages for domain abc.com are stuck in the delivery queue. Upon further investigation, the engineer notices that the messages pending delivery are destined for 192.168.1.11, when they should instead be routed to 192.168.1.10.

What configuration change needed to address this issue?

Options:

A.

Add an address list for domain abc.com .

B.

Modify Destination Controls entry for the domain abc.com .

C.

Modify the SMTP route for the domain and change the IP a ddress to 192.168.1.10.

D.

Modify the Routing Tables and add a route for IP address to 192.168.1.10.

Buy Now
Questions 34

Drag and drop the Cisco ESA reactions to a possible DLP from the left onto the correct action types on the right.

Options:

Buy Now
Questions 35

How does the graymail safe unsubscribe feature function?

Options:

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Buy Now
Questions 36

An engineer is configuring a Cisco Secure Email Gateway and needs to reject email messages to a recipient with email address user0516585210@acme.com . Which list contains the allowed recipient addresses?

Options:

A.

BAT

B.

HAT

C.

SAT

D.

RAT

Buy Now
Questions 37

A Cisco Secure Email Gateway appliance is processing many messages that are sent to invalid recipients verification. Which two steps are required to accomplish this task? (Choose two.)

Options:

A.

Enable external LDAP authentication

B.

Configure the LDAP query on a listener

C.

Configure LDAP server profiles

D.

Enable LDAP authentication on a listener

E.

Configure incoming mail policy to query LDAP server

Buy Now
Questions 38

What is the maximum message size that can be configured for encryption on the Cisco ESA?

Options:

A.

20 MB

B.

25 MB

C.

15 MB

D.

30 MB

Buy Now
Questions 39

Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)

Options:

A.

accept

B.

relay

C.

delay

D.

route

E.

reject

Buy Now
Questions 40

What is a category for classifying graymail?

Options:

A.

Malicious

B.

Marketing

C.

Spam

D.

Priority

Buy Now
Questions 41

Which method enables an engineer to deliver a flagged messag e to a specific virtual gateway address in the most flexible way?

Options:

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Buy Now
Questions 42

What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?

Options:

A.

provisioned email encryption profile

B.

message encryption from a content filter that select " Message Encryption " over TLS

C.

message encryption from the mail flow policies with " CRES " selected

D.

content filter to forward the email to the Cisco Registered Envelope server

Buy Now
Questions 43

Drag and drop the actions from the left into the sequence on the right to configure directory harvest prevention in Cisco Secure Email Gateway.

Options:

Buy Now
Questions 44

A Cisco Secure Email Gateway administrator recently enabled the Outbreak Filters Global Service Setting to detect Viral as well as Non-Viral threat detection, with no detection of Non-viral threats after 24 hours of monitoring Outbreak Filters What is the reason that Non-Viral threat detection is not detecting any positive verdicts?

Options:

A.

Non-Viral threat detection requires Antivirus or AMP enablement to properly function

B.

The Outbreak Filters option Graymail Header must be enabled

C.

Non-Viral threat detection requires AntiSpam or Intelligent Multi-Scan enablement to properly function.

D.

The Outbreak Filters option URL Rewriting must be enabled.

Buy Now
Questions 45

A trusted partner of an organization recently experienced a new campaign that was leveraging JavaScript attachments to trick users into executing malware. As a result, they created a local policy to deny messages with JavaScript attachments. Which action should the administrator of the organization take to ensure encrypted communications are delivered to the intended partner recipient?

Options:

A.

Insert the X-PostX-Use-Script ' header with a value of false to the encrypted messages

B.

Select JavaScript-free ' option within the Cisco Secure Email Encryption Service Add-in

C.

Create an outgoing content filter and add the Encrypt and Deliver Nov/ action with Use-Script option deselected

D.

Create a new encryption profile and deselect the ' Use-Script ' envelope settings option.

Buy Now
Questions 46

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?

Options:

A.

Enable the DKIM service checker

B.

Export the DNS TXT record to provide to the DNS registrar

C.

Import the DNS record of the service provider into the Cisco Secure Email Gateway.

D.

Configure the Trusted Sender Group message authenticity policy.

Buy Now
Questions 47

Which of the following two steps are required to enable Cisco SecureX integration on a Cisco Secure Email Gateway appliance? (Choose two.)

Options:

A.

Paste in the Registration Token generated from the Smart Licensing Account

B.

Enable the Threat Response service under Network > Cloud Service Settings.

C.

Select the correct Threat Response Server based on your region.

D.

Paste in the Registration Token generated from the Security Services Exchange.

E.

Enable the Security Services Exchange service under Network > Cloud Service Settings

Buy Now
Questions 48

The security administrator wants to configure alerts on Cisco Secure Email Gateway for outbreak filters. Which two actions must be taken to meet the requirement? (Choose two.)

Options:

A.

From Outbreak Filters Global Settings, enable the alerts for the outbreak filters.

B.

Enable the alerts for the outbreak filters by using an Adaptive Rule.

C.

From Mail Policies, configure the Outbreak Filters settings.

D.

From System Administration enable message splintering.

E.

From Security Services, configure the Outbreak Filters settings.

Buy Now
Questions 49

An engineer is tasked with reviewing mail logs to confirm that messages sent from domain abc.com are passing SPF verification and being accepted by the Cisco ESA. The engineer notices that SPF veri fication is not being performed and that SPF is not being referenced in the logs for messages sent from domain abc.com.

Why is the verification not working properly?

Options:

A.

SPF verification is disabled in the Recipient Access Table.

B.

SPF verification i s disabled on the Mail Flow Policy.

C.

The SPF conformance level is set to SIDF compatible on the Mail Flow Policy.

D.

An SPF verification Content Filter has not been created.

Buy Now
Questions 50

An engineer wants to utilize a digital signature in outgoing emails to validate to others that the email they are receiving was indeed sent and authorized by the owner of that domain Which two components should be configured on the Cisco Secure Email Gateway appliance to achieve this? (Choose two.)

Options:

A.

DMARC verification profile

B.

SPF record

C.

Public/Private keypair

D.

Domain signing profile

E.

PKI certificate

Buy Now
Questions 51

An organization has multiple Cisco Secure Email Gateway appliances deployed, resulting in several spam quarantines to manage. To manage the quarantined messages, the administrator enabled the centralized spam quarantine on the Cisco Secure Email and Web Manager appliance and configured the external spam quarantine on the Cisco Secure Email Gateway appliances. However, messages are still being directed to the local quarantine on the Cisco Secure Email Gateway appliances What change is necessary to complete the configuration?

Options:

A.

Modify the incoming mail policies on the Cisco Secure Email Gateway appliances to redirect to the external quarantine

B.

Disable the external spam quarantine on the Cisco Secure Email Gateway appliances

C.

Disable the local spam quarantine on the Cisco Secure Email Gateway appliances.

D.

Modify the external spam quarantine settings on the Cisco Secure Email Gateway appliances and change the port to 25

Buy Now
Questions 52

An email containing a URL passes through the Cisco ESA that has content filtering disabled for all mail policies. The sender is sampleuser@test1.com, the recipients are testuser1@test2.com, testuser2@test2.com, testuser3@test2.com, and mailer1@te st2.com. The subject of the email is Test Document395898847. An administrator wants to add a policy to ensure that the Cisco ESA evaluates the web reputation score before permitting this email.

Which two criteria must be used by the administrator to achie ve this? (Choose two.)

Options:

A.

Subject contains Test Document "

B.

Sender matches test1.com

C.

Email body contains a URL

D.

Date and time of email

E.

Email does not match mailer1@test2.com

Buy Now
Questions 53

Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.)

Options:

A.

The filters command executed from the CLI is used to configure the message filters.

B.

Message filters configuration within the web user interface is located within Incoming Content Filters.

C.

The filterconfig command executed from the CLI is used to configure message filters.

D.

Message filters can be configured only from the CLI.

E.

Message filters can be configured only from the web user interface.

Buy Now
Questions 54

Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?

Options:

A.

Add an additional mapping for attachment type for zip files.

B.

Enable assume match pattern if the email was not scanned for any reason.

C.

Increase the maximum recursion depth from 5 to a larger value.

D.

Increase the maximum attachment size to scan to a larger value.

Buy Now
Questions 55

Which two steps configure Forged Email Detection? (Choose two.)

Options:

A.

Configure a content dictionary with executive email addresses.

B.

Configure a filter to use the Forged Email Detection rule and dictionary.

C.

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.

Enable Forged Email Detection on the Security Services page.

E.

Configure a content dictionary with friendly names.

Buy Now
Questions 56

Drag and drop the graymail descriptions from the left onto the verdict categories they belong to on the right.

Options:

Buy Now
Questions 57

An administrator identifies tha t, over the past week, the Cisco ESA is receiving many emails from certain senders and domains which are being consistently quarantined. The administrator wants to ensure that these senders and domain are unable to send anymore emails.

Which feature on Ci sco ESA should be used to achieve this?

Options:

A.

incoming mail policies

B.

safelist

C.

blocklist

D.

S/MIME Sending Profile

Buy Now
Exam Code: 300-720
Exam Name: Securing Email with Cisco Email Security Appliance (300-720 SESA)
Last Update: May 12, 2026
Questions: 190
300-720 pdf

300-720 PDF

$28.5  $94.99
300-720 Engine

300-720 Testing Engine

$33  $109.99
300-720 PDF + Engine

300-720 PDF + Testing Engine

$43.5  $144.99