aiotestking uk

300-207 Exam Questions - Online Test


300-207 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Cisco’s ASA CX includes which two URL categories? (Choose two.) 

A. Proxy Avoidance 

B. Dropbox 

C. Hate Speech 

D. Facebook 

E. Social Networking 

F. Instant Messaging and Video Messaging 

Answer: C,E 

Q2. What is the authentication method for an encryption envelope that is set to medium security? 

A. The recipient must always enter a password, even if credentials are cached. 

B. A password is required, but cached credentials are permitted. 

C. The recipient must acknowledge the sensitivity of the message before it opens. 

D. The recipient can open the message without authentication. 

Answer:

Q3. Which three protocols are required when considering firewall rules for email services using a Cisco Email Security Appliance? (Choose three.) 

A. SMTP 

B. HTTP 

C. DNS 

D. SNMP 

E. FTP 

Answer: A,B,C 

Q4. What is a value that Cisco ESA can use for tracing mail flow? 

A. the FQDN of the source IP address 

B. the FQDN of the destination IP address 

C. the destination IP address 

D. the source IP address 

Answer:

Q5. What Event Action in an IPS signature is used to stop an attacker from communicating with a network using an access-list? 

A. Request Block Host 

B. Deny Attacker Inline 

C. Deny Connection Inline 

D. Deny Packet Inline 

E. Request Block Connection 

Answer:

Q6. The security team needs to limit the number of e-mails they receive from the Intellishield Alert Service. Which three parameters can they adjust to restrict alerts to specific product sets? (Choose three.) 

A. Vendor 

B. Chassis/Module 

C. Device ID 

D. Service Contract 

E. Version/Release 

F. Service Pack/Platform 

Answer: A,E,F 

Q7. What are the initial actions that can be performed on an incoming SMTP session by the workqueue of a Cisco Email Security Appliance? 

A. Accept, Reject, Relay, TCPRefuse 

B. LDAP Verification, Envelope Sender Verification, Bounce Verification, Alias Table Verification 

C. Recipient Access Table Verification, Host DNS Verification, Masquerading, Spam Payload Check 

D. SMTP Authentication, SBRS Verification, Sendergroup matching, DNS host verification 

Answer:

Q8. To what extent will the Cisco IPS sensor contribute data to the Cisco SensorBase network? 

A. It will not contribute to the SensorBase network. 

B. It will contribute to the SensorBase network, but will withhold some sensitive information 

C. It will contribute the victim IP address and port to the SensorBase network. 

D. It will not contribute to Risk Rating adjustments that use information from the SensorBase network. 

Answer:

Explanation: 

To configure network participation, follow these steps:.Step 1.Log in to IDM using an account with administrator privileges..Step 2.Choose Configuration > Policies > Global Correlation > Network Participation..Step 3.To turn on network participation, click the Partial or Full radio button:..Partial—Data is contributed to the SensorBase Network, but data considered potentially sensitive is filtered out and never sent...Full—All data is contributed to the SensorBase Network 

In this case, we can see that this has been turned off as shown below: 

Q9. Which two commands are used to verify that CWS redirection is working on a Cisco ASA appliance? (Choose two.) 

A. show scansafe statistics 

B. show webvpn statistics 

C. show service-policy inspect scansafe 

D. show running-config scansafe 

E. show running-config webvpn 

F. show url-server statistics 

Answer: A,C 

Q10. Which statement about Cisco IPS Manager Express is true? 

A. It provides basic device management for large-scale deployments. 

B. It provides a GUI for configuring IPS sensors and security modules. 

C. It enables communication with Cisco ASA devices that have no administrative access. 

D. It provides greater security than simple ACLs. 

Answer: