[August-2021]Free Braindump2go 300-720 Dumps VCE Download 300-720 103Q[Q87-Q103]

August/2021 Latest Braindump2go 300-720 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 300-720 Real Exam Questions!

QUESTION 87
Refer to the exhibit. Which configuration on the scan behavior must be updated to allow the attachment to be scanned on the Cisco ESA?
 
 

A.    Add an additional mapping for attachment type for zip files.
B.    Enable assume match pattern if the email was not scanned for any reason.
C.    Increase the maximum recursion depth from 5 to a larger value.
D.    Increase the maximum attachment size to scan to a larger value.

Answer: A

QUESTION 88
Users have been complaining of a higher volume of emails containing profanity. The network administrator will need to leverage dictionaries and create specific conditions to reduce the number of inappropriate emails.
Which two filters should be configured to address this? (Choose two.)

A.    message
B.    spam
C.    VOF
D.    sender group
E.    content

Answer: BE

QUESTION 89
Refer to the exhibit. What is the correct order of commands to set filter 2 to active?
 

A.    filters-> edit-> 2-> Active
B.    filters-> modify-> All-> Active
C.    filters-> detail-> 2-> 1
D.    filters-> set-> 2-> 1

Answer: D

QUESTION 90
A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”
Which feature must be used to address this?

A.    DHAP
B.    SBRS
C.    LDAP
D.    SMTP

Answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_011010.html

QUESTION 91
Refer to the exhibits. What must be done to enforce end user authentication before accessing quarantine?
 
 

A.    Enable SPAM notification and use LDAP for authentication.
B.    Enable SPAM Quarantine Notification and add the %quarantine_url% variable.
C.    Change the end user quarantine access from None authentication to SAAS.
D.    Change the end user quarantine access setting from None authentication to Mailbox.

Answer: A
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118692-configure-esa-00.html#anc7

QUESTION 92
An engineer is configuring a Cisco ESA for the first time and needs to ensure that any email traffic coming from the internal SMTP servers is relayed out through the Cisco ESA and is tied to the Outgoing Mail Policies.
Which Mail Flow Policy setting should be modified to accomplish this goal?

A.    Exception List
B.    Connection Behavior
C.    Bounce Detection Signing
D.    Reverse Connection Verification

Answer: B
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118136-qanda-esa-00.html

QUESTION 93
An organization wants to use its existing Cisco ESA to host a new domain and enforce a separate corporate policy for that domain.
What should be done on the Cisco ESA to achieve this?

A.    Use the smtproutes command to configure a SMTP route for the new domain.
B.    Use the deli very config command to configure mail delivery for the new domain.
C.    Use the dsestconf command to add a separate destination for the new domain.
D.    Use the altrchost command to add a separate gateway for the new domain.

Answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_011001.html

QUESTION 94
An engineer is configuring an SMTP authentication profile on a Cisco ESA which requires certificate verification.
Which section must be configured to accomplish this goal?

A.    Mail Flow Policies
B.    Sending Profiles
C.    Outgoing Mail Policies
D.    Verification Profiles

Answer: A

QUESTION 95
Which component must be added to the content filter to trigger on failed SPF Verification or DKIM Authentication verdicts?

A.    status
B.    response
C.    parameter
D.    condition

Answer: D

QUESTION 96
An organization wants to use DMARC to improve its brand reputation by leveraging DNS records.
Which two email authentication mechanisms are utilized during this process? (Choose two.)

A.    SPF
B.    DSTP
C.    DKIM
D.    TLS
E.    PKI

Answer: AC
Explanation:
https://www.cisco.com/c/en/us/products/security/what-is-dmarc.html

QUESTION 97
An engineer is tasked with reviewing mail logs to confirm that messages sent from domain abc.com are passing SPF verification and being accepted by the Cisco ESA. The engineer notices that SPF verification is not being performed and that SPF is not being referenced in the logs for messages sent from domain abc.com.
Why is the verification not working properly?

A.    SPF verification is disabled in the Recipient Access Table.
B.    SPF verification is disabled on the Mail Flow Policy.
C.    The SPF conformance level is set to SIDF compatible on the Mail Flow Policy.
D.    An SPF verification Content Filter has not been created.

Answer: D

QUESTION 98
An administrator needs to configure Cisco ESA to ensure that emails are sent and authorized by the owner of the domain. Which two steps must be performed to accomplish this task? (Choose two.)

A.    Generate keys.
B.    Create signing profile.
C.    Create Mx record.
D.    Enable SPF verification.
E.    Create DMARC profile.

Answer: DE

QUESTION 99
What is the purpose of Cisco Email Encryption on Cisco ESA?

A.    to ensure anonymity between a recipient and MTA
B.    to ensure integrity between a sender and MTA
C.    to authenticate direct communication between a sender and Cisco ESA
D.    to ensure privacy between Cisco ESA and MTA

Answer: D

QUESTION 100
A Cisco ESA administrator has noticed that new messages being sent to the Centralized Policy Quarantine are being released after one hour. Previously, they were being held for a day before being released.
What was configured that caused this to occur?

A.    The retention period was changed to one hour.
B.    The threshold settings were set to override the clock settings.
C.    The retention period was set to default.
D.    The threshold settings were set to default.

Answer: D

QUESTION 101
What are organizations trying to address when implementing a SPAM quarantine?

A.    true positives
B.    false negatives
C.    false positives
D.    true negatives

Answer: C
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_0100000.html#con_ 1482874

QUESTION 102
Which two Cisco ESA features are used to control email delivery based on the sender? (Choose two.)

A.    incoming mail policies
B.    spam quarantine
C.    outbreak filter
D.    safelists
E.    blocklists

Answer: DE

QUESTION 103
Drag and Drop Question
An administrator must ensure that emails sent from [email protected] are routed through an alternate virtual gateway. Drag and drop the snippet from the bottom onto the blank in the graphic to finish the message filter syntax. Not all snippets are used.
 
Answer:
 


Resources From:

1.2021 Latest Braindump2go 300-720 Exam Dumps (PDF & VCE) Free Share:
https://www.braindump2go.com/300-720.html

2.2021 Latest Braindump2go 300-720 PDF and 300-720 VCE Dumps Free Share:
https://drive.google.com/drive/folders/1CWQxEgDC6s96s0xdef_OXd8TQRMElfP0?usp=sharing

3.2021 Free Braindump2go 300-720 Exam Questions Download:
https://www.braindump2go.com/free-online-pdf/300-720-PDF-Dumps(71-86).pdf
https://www.braindump2go.com/free-online-pdf/300-720-VCE-Dumps(87-103).pdf

Free Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams!

Releated

[November-2023]400-007 PDF and VCE Dumps 400-007 320Q Instant Download in Braindump2go[Q293-Q303]

November/2023 Latest Braindump2go 400-007 Exam Dumps with PDF and VCE Free Updated Today! Following are some new Braindump2go 400-007 Real Exam Questions! QUESTION 293Which security architecture component offers streamlined security operations, ease of use, and visibility across all network security elements, independent of location or form factor? A. threat-centric protectionB. integrated actionable intelligenceC. distributed enforcementD. […]