300-207 Premium Bundle

300-207 Premium Bundle

Implementing Cisco Threat Control Solutions (SITCS) Certification Exam

4.5 
(5925 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Cisco 300-207 Free Practice Questions

Q1. Refer to the exhibit. 

When designing the network to redirect web traffic utilizing the Catalyst 6500 to the Cisco Web Security Appliance, impact on the switch platform needs consideration. Which four rows identify the switch behavior in correlation to the redirect method? (Choose four.) 

A. Row 1 

B. Row 2 

C. Row 3 

D. Row 4 

E. Row 5 

F. Row 6 

G. Row 7 

H. Row 8 

Answer: B,C,F,G 

Q2. Which five system management protocols are supported by the Cisco Intrusion Prevention System? (Choose five.) 

A. SNMPv2c 

B. SNMPv1 

C. SNMPv2 

D. SNMPv3 

E. Syslog 

F. SDEE 

G. SMTP 

Answer: A,B,C,F,G 

Q3. Which IPS engine detects ARP spoofing? 

A. Atomic ARP Engine 

B. Service Generic Engine 

C. ARP Inspection Engine 

D. AIC Engine 

Answer:

Q4. Which role does Passive Identity Management play in the Cisco Cloud Web Security architecture? 

A. It provides user-level information that is received from Active Directory. 

B. It enables the administrator to control web access for users and user groups. 

C. It defines a standard for exchanging authentication and authorization data. 

D. It controls content that passes into and out of the network. 

Answer:

Q5. What is the correct deployment for an IPS appliance in a network where traffic identified as threat traffic should be blocked and all traffic is blocked if the IPS fails? 

A. Inline; fail open 

B. Inline; fail closed 

C. Promiscuous; fail open 

D. Promiscuous; fail closed 

Answer:

Q6. Which two practices are recommended for implementing NIPS at enterprise Internet edges? (Choose two.) 

A. Integrate sensors primarily on the more trusted side of the firewall (inside or DMZ interfaces). 

B. Integrate sensors primarily on the less trusted side of the firewall (outside interfaces). 

C. Implement redundant IPS and make data paths symmetrical. 

D. Implement redundant IPS and make data paths asymmetrical. 

E. Use NIPS only for small implementations. 

Answer: A,C 

Q7. Which statement about Cisco IPS Manager Express is true? 

A. It provides basic device management for large-scale deployments. 

B. It provides a GUI for configuring IPS sensors and security modules. 

C. It enables communication with Cisco ASA devices that have no administrative access. 

D. It provides greater security than simple ACLs. 

Answer:

Q8. A new Cisco IPS device has been placed on the network without prior analysis. Which CLI command shows the most fired signature? 

A. Show statistics virtual-sensor 

B. Show event alert 

C. Show alert 

D. Show version 

Answer:

Q9. Which two commands are valid URL filtering commands? (Choose two.) 

A. url-server (DMZ) vendor smartfilter host 10.0.1.1 

B. url-server (DMZ) vendor url-filter host 10.0.1.1 

C. url-server (DMZ) vendor n2h2 host 10.0.1.1 

D. url-server (DMZ) vendor CISCO host 10.0.1.1 

E. url-server (DMZ) vendor web host 10.0.1.1 

Answer: A,C 

Q10. Which three features does Cisco CX provide? (Choose three.) 

A. HTTPS traffic decryption and inspection 

B. Application Visibility and Control 

C. Category or reputation-based URL filtering 

D. Email virus scanning 

E. Application optimization and acceleration 

F. VPN authentication 

Answer: A,B,C 

Q11. The security team needs to limit the number of e-mails they receive from the Intellishield Alert Service. Which three parameters can they adjust to restrict alerts to specific product sets? (Choose three.) 

A. Vendor 

B. Chassis/Module 

C. Device ID 

D. Service Contract 

E. Version/Release 

F. Service Pack/Platform 

Answer: A,E,F 

Q12. The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs). 

The simulator will provide access to the graphical user interfaces of one Cisco ASA and one Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are implemented in the simulator. The options that have been implemented are sufficient to determine the best answer to each of the questions that are presented. 

Your task is to examine the details available in the simulated graphical user interfaces and select the best answer. 

Which of the following is true with respect to the version of WCCP configured on the Cisco ASA and the Cisco WSA? 

A. Both are configured for WCCP v1. 

B. Both are configured for WCCP v2. 

C. Both are configured for WCCP v3. 

D. There is a WCCP version mismatch between the Cisco WSA and the Cisco ASA. 

Answer:

Explanation: 

ASA version shows as version 2.0: 

\\psf\Home\Desktop\Screen Shot 2015-01-27 at 9.45.57 AM.png 

WSA also shows version 2 is being used: 

\\psf\Home\.Trash\Screen Shot 2015-01-27 at 9.47.53 AM.png 

Q13. Which Cisco Web Security Appliance design requires minimal change to endpoint devices? 

A. Transparent Mode 

B. Explicit Forward Mode 

C. Promiscuous Mode 

D. Inline Mode 

Answer:

Q14. What can you use to access the Cisco IPS secure command and control channel to make configuration changes? 

A. SDEE 

B. the management interface 

C. an HTTP server 

D. Telnet 

Answer:

Q15. Which Cisco IPS deployment mode is best suited for bridged interfaces? 

A. inline interface pair mode 

B. inline VLAN pair mode 

C. inline VLAN group mode 

D. inline pair mode 

Answer:

Q16. What command alters the SSL ciphers used by the Cisco Email Security Appliance for TLS 

sessions and HTTPS access? 

A. sslconfig 

B. sslciphers 

C. tlsconifg 

D. certconfig 

Answer:

START 300-207 EXAM