Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

300-720 PDF

$49

$139.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

300-720 PDF + Testing Engine

$66.5

$189.99

3 Months Free Update

  • Exam Name: Securing Email with Cisco Email Security Appliance (300-720 SESA)
  • Last Update: Jul 8, 2025
  • Questions and Answers: 147
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

300-720 Engine

$56

$159.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

300-720 Practice Exam Questions with Answers Securing Email with Cisco Email Security Appliance (300-720 SESA) Certification

Question # 6

A network administrator enabled McAfee antivirus scanning on a Cisco Secure Email Gateway and configured the virus scanning action of "scan for viruses only" If the scanner finds a virus in an attachment for an incoming email, what action will be applied to this message?

A.

The email and attachment are forwarded to the network administrator.

B.

No repair is attempted, and the attachment is either dropped or delivered

C.

The attachment is dropped and replaced with a "Removed Attachment" file

D.

The system will attempt to repair the attachment

Full Access
Question # 7

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)

A.

DKIM

B.

Public Keys

C.

Domain Keys

D.

Symmetric Keys

E.

Private Keys

Full Access
Question # 8

Which SMTP extension does Cisco ESA support for email security?

A.

ETRN

B.

UTF8SMTP

C.

PIPELINING

D.

STARTTLS

Full Access
Question # 9

A Cisco ESA administrator has noticed that new messages being sent to the Centralized Policy Quarantine are being released after one hour. Previously, they were being held for a day before being released.

What was configured that caused this to occur?

A.

The retention period was changed to one hour.

B.

The threshold settings were set to override the clock settings.

C.

The retention period was set to default.

D.

The threshold settings were set to default.

Full Access
Question # 10

An administrator is trying to enable centralized PVO but receives the error, "Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters / DLP actions available at a level different from the cluster level."

What is the cause of this error?

A.

Content filters are configured at the machine-level on esa1.

B.

DLP is configured at the cluster-level on esa2.

C.

DLP is configured at the domain-level on esa1.

D.

DLP is not configured on host1.

Full Access
Question # 11

Which two are configured in the DMARC verification profile? (Choose two.)

A.

name of the verification profile

B.

minimum number of signatures to verify

C.

ESA listeners to use the verification profile

D.

message action into an incoming or outgoing content filter

E.

message action to take when the policy is reject/quarantine

Full Access
Question # 12

What is the default behavior of any listener for TLS communication?

A.

preferred-verify

B.

off

C.

preferred

D.

required

Full Access
Question # 13

Which two components form the graymail management solution in Cisco ESA? (Choose two.)

A.

cloud-based unsubscribe service

B.

uniform unsubscription management interface for end users

C.

secure subscribe option for end users

D.

integrated graymail scanning engine

E.

improved mail efficacy

Full Access
Question # 14

An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)

A.

domains

B.

senders

C.

reputation score

D.

receivers

E.

spf check

Full Access
Question # 15

Which antispam feature is utilized to give end users control to allow emails that are spam to be delivered to their inbox, overriding any spam verdict and action on the Cisco ESA?

A.

end user allow list

B.

end user spam quarantine access

C.

end user passthrough list

D.

end user safelist

Full Access
Question # 16

Refer to the exhibit.

300-720 question answer

300-720 question answer

Which configuration allows the Cisco Secure Email Gateway to scan for executables inside the archive file and apply the action as per the content filter?

A.

Configure the recursion depth to a higher value.

B.

Modify the content filter to look for attachment filetype of compressed.

C.

Configure the maximum attachment size to a higher value.

D.

Modify the content filter to look for exe filename instead of executable filetype.

Full Access
Question # 17

Which two action types are performed by Cisco ESA message filters? (Choose two.)

A.

non-final actions

B.

filter actions

C.

discard actions

D.

final actions

E.

quarantine actions

Full Access
Question # 18

Which action on the Cisco ESA provides direct access to view the safelist/blocklist?

A.

Show the SLBL cache on the CLI.

B.

Monitor Incoming/Outgoing Listener.

C.

Export the SLBL to a .csv file.

D.

Debug the mail flow policy.

Full Access
Question # 19

Which type of attack is prevented by configuring file reputation filtering and file analysis features?

A.

denial of service

B.

zero-day

C.

backscatter

D.

phishing

Full Access
Question # 20

Which components are required when encrypting SMTP with TLS on a Cisco Secure Email Gateway appliance when the sender requires TLS verification?

A.

DER certificate and matching public key from a CA

B.

self-signed certificate in PKCS#7 format

C.

X. 509 certificate and matching private key from a CA

D.

self-signed certificate in PKCS#12 format

Full Access
Question # 21

Which two features are applied to either incoming or outgoing mail policies? (Choose two.)

A.

Indication of Compromise

B.

application filtering

C.

outbreak filters

D.

sender reputation filtering

E.

antivirus

Full Access
Question # 22

An engineer is configuring a Cisco ESA for the first time and needs to ensure that any email traffic coming from the internal SMTP servers is relayed out through the Cisco ESA and is tied to the Outgoing Mail Policies.

Which Mail Flow Policy setting should be modified to accomplish this goal?

A.

Exception List

B.

Connection Behavior

C.

Bounce Detection Signing

D.

Reverse Connection Verification

Full Access
Question # 23

The CEO added a sender to a safelist but does not receive an important message expected from the trusted sender. An engineer evaluates message tracking on the Cisco Secure Email Gateway appliance and determines that the message was dropped by the antivirus engine. What is the reason for this behavior?

A.

The sender is included in an ISP blocklist

B.

Administrative access is required to create a safelist.

C.

The sender didn't mark the message as urgent

D.

End-user safelists apply to antispam engines only.

Full Access
Question # 24

When the spam quarantine is configured on the Cisco Secure Email Gateway, which type of query is used to validate non administrative user access to the end-user quarantine via LDAP?

A.

spam quarantine end-user authentication

B.

spam quarantine alias consolidation

C.

spam quarantine external authorization

D.

local mailbox (IMAP/POP) authentication

Full Access
Question # 25

A list of company executives is routinely being spoofed, which puts the company at risk of malicious email attacks An administrator must ensure that executive messages are originating from legitimate sending addresses Which two steps must be taken to accomplish this task? (Choose two.)

A.

Create an incoming content filter with SPF detection.

B.

Enable the Forged Email Detection feature under Security Settings.

C.

Enable DMARC feature under Mail Policies.

D.

Create an incoming content filter with the Forged Email Detection condition

E.

Create a content dictionary including a list of the names that are being spoofed.

Full Access
Question # 26

An organization wants to prevent proprietary patent documents from being shared externally via email. The network administrator reviewed the DLP policies on the Cisco Secure Email Gateway and could not find an existing policy with the appropriate matching patterns. Which type of DLP policy template must be used to create a policy that meets this requirement?

A.

privacy protection

B.

custom policy

C.

regulatory compliance

D.

acceptable use

Full Access
Question # 27

An organization has multiple Cisco Secure Email Gateway appliances deployed, resulting in several spam quarantines to manage. To manage the quarantined messages, the administrator enabled the centralized spam quarantine on the Cisco Secure Email and Web Manager appliance and configured the external spam quarantine on the Cisco Secure Email Gateway appliances. However, messages are still being directed to the local quarantine on the Cisco Secure Email Gateway appliances What change is necessary to complete the configuration?

A.

Modify the incoming mail policies on the Cisco Secure Email Gateway appliances to redirect to the external quarantine

B.

Disable the external spam quarantine on the Cisco Secure Email Gateway appliances

C.

Disable the local spam quarantine on the Cisco Secure Email Gateway appliances.

D.

Modify the external spam quarantine settings on the Cisco Secure Email Gateway appliances and change the port to 25

Full Access
Question # 28

What are two phases of the Cisco ESA email pipeline? (Choose two.)

A.

reject

B.

workqueue

C.

action

D.

delivery

E.

quarantine

Full Access
Question # 29

Which two components must be configured to perform DLP scanning? (Choose two.)

A.

Add a DLP policy on the Incoming Mail Policy.

B.

Add a DLP policy to the DLP Policy Manager.

C.

Enable a DLP policy on the Outgoing Mail Policy.

D.

Enable a DLP policy on the DLP Policy Customizations.

E.

Add a DLP policy to the Outgoing Content Filter.

Full Access
Question # 30

300-720 question answer

Refer to the exhibit. An engineer needs to change the existing Forged Email Detection message filter so that it references a newly created dictionary named ‘Executives’.

What should be done to accomplish this task?

A.

Change "from" to "Executives".

B.

Change "TESF to "Executives".

C.

Change fed' to "Executives".

D.

Change "support" to "Executives".

Full Access
Question # 31

When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)

A.

redirect

B.

return

C.

drop

D.

delay

E.

abandon

Full Access
Question # 32

An engineer is tasked with reviewing mail logs to confirm that messages sent from domain abc.com are passing SPF verification and being accepted by the Cisco ESA. The engineer notices that SPF verification is not being performed and that SPF is not being referenced in the logs for messages sent from domain abc.com.

Why is the verification not working properly?

A.

SPF verification is disabled in the Recipient Access Table.

B.

SPF verification is disabled on the Mail Flow Policy.

C.

The SPF conformance level is set to SIDF compatible on the Mail Flow Policy.

D.

An SPF verification Content Filter has not been created.

Full Access
Question # 33

What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?

A.

provisioned email encryption profile

B.

message encryption from a content filter that select "Message Encryption" over TLS

C.

message encryption from the mail flow policies with "CRES" selected

D.

content filter to forward the email to the Cisco Registered Envelope server

Full Access
Question # 34

What is the maximum message size that can be configured for encryption on the Cisco ESA?

A.

20 MB

B.

25 MB

C.

15 MB

D.

30 MB

Full Access
Question # 35

When URL logging is configured on a Cisco ESA, which feature must be enabled first?

A.

antivirus

B.

antispam

C.

virus outbreak filter

D.

senderbase reputation filter

Full Access
Question # 36

An administrator manipulated the subnet mask but was still unable to access the user interface. How must the administrator access the Cisco Secure Email Gateway appliance to perform the initial configuration?

A.

Use the serial or console port

B.

Use the management port

C.

Use the data 2 port

D.

Use the data 1 port

Full Access
Question # 37

Which component must be added to the content filter to trigger on failed SPF Verification or DKIM Authentication verdicts?

A.

status

B.

response

C.

parameter

D.

condition

Full Access
Question # 38

A company has recently updated their security policy and now wants to drop all email messages larger than 100 MB coming from external sources. The Cisco Secure Email Gateway is LDAP integrated and all employee accounts are in the group "Employees". Which filter rule configuration provides the desired outcome?

A.

if (mail-from-group == 'Employees') and (body-size > "100M") {drop()}

B.

if (mail-from-group != 'Employees') and (body-size > 100M) {drop();}

C.

if (mail-from-group == 'Employees') and (body-size > 100M) {bounce();}

D.

if ('mail-from-group != Employees') and (body-size > 100M) {drop();}

Full Access
Question # 39

What is the order of virus scanning when multilayer antivirus scanning is configured?

A.

The default engine scans for viruses first and the McAfee engine scans for viruses second.

B.

The Sophos engine scans for viruses first and the McAfee engine scans for viruses second.

C.

The McAfee engine scans for viruses first and the default engine scans for viruses second.

D.

The McAfee engine scans for viruses first and the Sophos engine scans for viruses second.

Full Access
Question # 40

Which process is skipped when an email is received from safedomain.com, which is on the safelist?

A.

message filter

B.

antivirus scanning

C.

outbreak filter

D.

antispam scanning

Full Access
Question # 41

A Cisco Secure Email Gateway appliance is processing many messages that are sent to invalid recipients verification. Which two steps are required to accomplish this task? (Choose two.)

A.

Enable external LDAP authentication

B.

Configure the LDAP query on a listener

C.

Configure LDAP server profiles

D.

Enable LDAP authentication on a listener

E.

Configure incoming mail policy to query LDAP server

Full Access
Question # 42

Which two configurations are used on multiple LDAP servers to connect with Cisco ESA? (Choose two.)

A.

load balancing

B.

SLA monitor

C.

active-standby

D.

failover

E.

active-active

Full Access
Question # 43

An engineer is testing mail flow on a new Cisco ESA and notices that messages for domain abc.com are stuck in the delivery queue. Upon further investigation, the engineer notices that the messages pending delivery are destined for 192.168.1.11, when they should instead be routed to 192.168.1.10.

What configuration change needed to address this issue?

A.

Add an address list for domain abc.com.

B.

Modify Destination Controls entry for the domain abc.com.

C.

Modify the SMTP route for the domain and change the IP address to 192.168.1.10.

D.

Modify the Routing Tables and add a route for IP address to 192.168.1.10.

Full Access
Question # 44

Which two steps are needed to disable local spam quarantine before external quarantine is enabled? (Choose two.)

A.

Uncheck the Enable Spam Quarantine check box.

B.

Select Monitor and click Spam Quarantine.

C.

Check the External Safelist/Blocklist check box.

D.

Select External Spam Quarantine and click on Configure.

E.

Select Security Services and click Spam Quarantine.

Full Access