300-207 Premium Bundle

300-207 Premium Bundle

Implementing Cisco Threat Control Solutions (SITCS) Certification Exam

4.5 
(32385 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-207 Free Practice Questions

Q1. Refer to the exhibit. 

When designing the network to redirect web traffic utilizing the Catalyst 6500 to the Cisco Web Security Appliance, impact on the switch platform needs consideration. Which four rows identify the switch behavior in correlation to the redirect method? (Choose four.) 

A. Row 1 

B. Row 2 

C. Row 3 

D. Row 4 

E. Row 5 

F. Row 6 

G. Row 7 

H. Row 8 

Answer: B,C,F,G 

Q2. What is a value that Cisco ESA can use for tracing mail flow? 

A. the FQDN of the source IP address 

B. the FQDN of the destination IP address 

C. the destination IP address 

D. the source IP address 

Answer:

Q3. What are the two policy types that can use a web reputation profile to perform reputation-based processing? (Choose two.) 

A. profile policies 

B. encryption policies 

C. decryption policies 

D. access policies 

Answer: C,D 

Q4. Which two conditions must you configure in an event action override to implement a risk rating of 70 or higher and terminate the connection on the IPS? (Choose two.) 

A. Configure the event action override to send a TCP reset. 

B. Set the risk rating range to 70 to 100. 

C. Configure the event action override to send a block-connection request. 

D. Set the risk rating range to 0 to 100. 

E. Configure the event action override to send a block-host request. 

Answer: A,B 

Q5. During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by using which command in a policy-map? 

A. cxsc fail 

B. cxsc fail-close 

C. cxsc fail-open 

D. cxssp fail-close 

Answer:

Q6. Refer to the exhibit. 

What Cisco ESA CLI command generated the output? 

A. smtproutes 

B. tophosts C. hoststatus 

D. workqueuestatus 

Answer:

Q7. To what extent will the Cisco IPS sensor contribute data to the Cisco SensorBase network? 

A. It will not contribute to the SensorBase network. 

B. It will contribute to the SensorBase network, but will withhold some sensitive information 

C. It will contribute the victim IP address and port to the SensorBase network. 

D. It will not contribute to Risk Rating adjustments that use information from the SensorBase network. 

Answer:

Explanation: 

To configure network participation, follow these steps:.Step 1.Log in to IDM using an account with administrator privileges..Step 2.Choose Configuration > Policies > Global Correlation > Network Participation..Step 3.To turn on network participation, click the Partial or Full radio button:..Partial—Data is contributed to the SensorBase Network, but data considered potentially sensitive is filtered out and never sent...Full—All data is contributed to the SensorBase Network 

In this case, we can see that this has been turned off as shown below: 

Q8. A new Cisco IPS device has been placed on the network without prior analysis. Which CLI command shows the most fired signature? 

A. Show statistics virtual-sensor 

B. Show event alert 

C. Show alert 

D. Show version 

Answer:

Q9. Which three statements about Cisco CWS are true? (Choose three.) 

A. It provides protection against zero-day threats. 

B. Cisco SIO provides it with threat updates in near real time. 

C. It supports granular application policies. 

D. Its Roaming User Protection feature protects the VPN from malware and data breaches. 

E. It supports local content caching. 

F. Its Cognitive Threat Analytics feature uses cloud-based analysis and detection to block threats outside the network. 

Answer: A,B,C 

Q10. Which three protocols are required when considering firewall rules for email services using a Cisco Email Security Appliance? (Choose three.) 

A. SMTP 

B. HTTP 

C. DNS 

D. SNMP 

E. FTP 

Answer: A,B,C 

Q11. Which three zones are used for anomaly detection in a Cisco IPS? (Choose three.) 

A. internal zone 

B. external zone 

C. illegal zone 

D. inside zone 

E. outside zone 

F. DMZ zone 

Answer: A,B,C 

Q12. Who or what calculates the signature fidelity rating? 

A. the signature author 

B. Cisco Professional Services 

C. the administrator 

D. the security policy 

Answer:

Q13. Which Cisco technology prevents targeted malware attacks, provides data loss prevention and spam protection, and encrypts email? 

A. SBA 

B. secure mobile access 

C. IPv6 DMZ web service 

D. ESA 

Answer:

Q14. Which three search parameters are supported by the Email Security Monitor? (Choose three.) 

A. Destination domain 

B. Network owner 

C. MAC address 

D. Policy requirements 

E. Internal sender IP address 

F. Originating domain 

Answer: A,B,E 

Q15. Which two benefits are provided by the dynamic dashboard in Cisco ASDM Version 5.2? (Choose two.) 

A. It configures system polices for NAC devices. 

B. It forwards traffic to destination devices. 

C. It provides statistics for device health. 

D. It replaces syslog, RADIUS, and TACACS+ servers. 

E. It automatically detects Cisco security appliances to configure. 

Answer: C,E 

Q16. Which Cisco Security IntelliShield Alert Manager Service component mitigates new botnet, phishing, and web-based threats? 

A. the IntelliShield Threat Outbreak Alert 

B. IntelliShield Alert Manager vulnerability alerts 

C. the IntelliShield Alert Manager historical database 

D. the IntelliShield Alert Manager web portal 

E. the IntelliShield Alert Manager back-end intelligence engine 

Answer:

START 300-207 EXAM