300-207 Premium Bundle

300-207 Premium Bundle

Implementing Cisco Threat Control Solutions (SITCS) Certification Exam

4.5 
(33195 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

Cisco 300-207 Free Practice Questions

Q1. What CLI command configures IP-based access to restrict GUI and CLI access to a Cisco Email Security appliance's administrative interface? 

A. adminaccessconfig 

B. sshconfig 

C. sslconfig 

D. ipaccessconfig 

Answer:

Q2. What is the access-list command on a Cisco IPS appliance used for? 

A. to permanently filter traffic coming to the Cisco.IPS.appliance via the sensing port 

B. to filter for traffic when the Cisco.IPS.appliance is in the inline mode 

C. to restrict management access to the sensor 

D. to create a filter that can be applied on the interface that is under attack 

Answer:

Q3. What can you use to access the Cisco IPS secure command and control channel to make configuration changes? 

A. SDEE 

B. the management interface 

C. an HTTP server 

D. Telnet 

Answer:

Q4. What is the status of OS Identification? 

A. It is only enabled to identify "Cisco IOS" OS using statically mapped OS fingerprinting 

B. OS mapping information will not be used for Risk Rating calculations. 

C. It is configured to enable OS mapping and ARR only for the 10.0.0.0/24 network. 

D. It is enabled for passive OS fingerprinting for all networks. 

Answer:

Explanation: 

Understanding Passive OS Fingerprinting.Passive OS fingerprinting lets the sensor determine the OS that hosts are running. The sensor analyzes network traffic between hosts and stores the OS of these hosts with their IP addresses. The sensor inspects TCP SYN and SYNACK packets exchanged on the network to determine the OS type..The sensor then uses the OS of the target host OS to determine the relevance of the attack to the victim by computing the attack relevance rating component of the risk rating. Based on the relevance of the attack, the sensor may alter the risk rating of the alert for the attack and/or the sensor may filter the alert for the attack. You can then use the risk rating to reduce the number of false positive alerts (a benefit in IDS mode) or definitively drop suspicious packets (a benefit in IPS mode). Passive OS fingerprinting also enhances the alert output by reporting the victim OS, the source of the OS identification, and the relevance to the victim OS in the alert..Passive OS fingerprinting consists of three components: .Passive OS learning.Passive OS learning occurs as the sensor observes traffic on the network. Based on the characteristics of TCP SYN and SYNACK packets, the sensor makes a determination of the OS running on the host of the source IP address. 

.User-configurable OS identification.You can configure OS host mappings, which take precedence over learned OS mappings. .Computation of attack relevance rating and risk rating 

Q5. Which three functions can Cisco Application Visibility and Control perform within Cisco Cloud Web Security? (Choose three.) 

A. validation of malicious traffic 

B. traffic control 

C. extending Web Security to all computing devices 

D. application-level classification 

E. monitoring 

F. signature tuning 

Answer: B,D,E 

Q6. A network engineer may use which three types of certificates when implementing HTTPS decryption services on the ASA CX? (Choose three.) 

A. Self Signed Server Certificate 

B. Self Signed Root Certificate 

C. Microsoft CA Server Certificate 

D. Microsoft CA Subordinate Root Certificate 

E. LDAP CA Server Certificate 

F. LDAP CA Root Certificate 

G. Public Certificate Authority Server Certificate 

H. Public Certificate Authority Root Certificate 

Answer: B,D,F 

Q7. Which three functions can Cisco Application Visibility and Control perform? (Choose three.) 

A. Validation of malicious traffic 

B. Traffic control 

C. Extending Web Security to all computing devices 

D. Application-level classification 

E. Monitoring 

F. Signature tuning 

Answer: B,D,E 

Q8. Which three options are characteristics of router-based IPS? (Choose three.) 

A. It is used for large networks. 

B. It is used for small networks. 

C. It supports virtual sensors. 

D. It supports multiple VRFs. 

E. It uses configurable anomaly detection. 

F. Signature definition files have been deprecated. 

Answer: B,D,F 

Q9. Which three features does Cisco CX provide? (Choose three.) 

A. HTTPS traffic decryption and inspection 

B. Application Visibility and Control 

C. Category or reputation-based URL filtering 

D. Email virus scanning 

E. Application optimization and acceleration 

F. VPN authentication 

Answer: A,B,C 

Q10. In which way are packets handled when the IPS internal zone is set to "disabled"? 

A. All packets are dropped to the external zone. 

B. All packets are dropped to the internal zone. 

C. All packets are ignored in the internal zone. 

D. All packets are sent to the default external zone. 

Answer:

Q11. When a Cisco IPS is deployed in fail-closed mode, what are two conditions that can result in traffic being dropped? (Choose two.) 

A. The signature engine is undergoing the build process. 

B. The SDF failed to load. 

C. The built-in signatures are unavailable. 

D. An ACL is configured. 

Answer: A,B 

Q12. Which two statements regarding the basic setup of the Cisco CX for services are correct? (Choose two.) 

A. The Packet capture feature is available for either permitted or dropped packets by default. 

B. Public Certificates can be used for HTTPS Decryption policies. 

C. Public Certificates cannot be used for HTTPS Decryption policies. 

D. When adding a standard LDAP realm, the group attribute will be UniqueMember. 

E. The Packet capture features is available for permitted packets by default. 

Answer: C,E 

Q13. Which Cisco ESA command is used to edit the ciphers that are used for GUI access? 

A. interfaceconfig 

B. etherconfig 

C. certconfig 

D. sslconfig 

Answer:

Q14. Who or what calculates the signature fidelity rating in a Cisco IPS? 

A. the signature author 

B. Cisco Professional Services 

C. the administrator 

D. the security policy 

Answer:

Q15. The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs). 

The simulator will provide access to the graphical user interfaces of one Cisco ASA and one Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are implemented in the simulator. The options that have been implemented are sufficient to determine the best answer to each of the questions that are presented. 

Your task is to examine the details available in the simulated graphical user interfaces and select the best answer. 

Between the Cisco ASA configuration and the Cisco WSA configuration, what is true with respect to redirected ports? 

A. Both are configured for port 80 only. 

B. Both are configured for port 443 only. 

C. Both are configured for both port 80 and 443. 

D. Both are configured for ports 80, 443 and 3128. 

E. There is a configuration mismatch on redirected ports. 

Answer:

Explanation: This can be seen from the WSA Network tab shown below: 

\\psf\Home\Desktop\Screen Shot 2015-01-27 at 9.42.49 AM.png 

Q16. Which sensor deployment mode does Cisco recommend when interface capacity is limited and you need to increase sensor functionality? 

A. inline interface pair mode 

B. inline VLAN pair mode 

C. inline VLAN group mode 

D. VLAN group mode 

Answer:

START 300-207 EXAM