300-207 Premium Bundle

300-207 Premium Bundle

Implementing Cisco Threat Control Solutions (SITCS) Certification Exam

4.5 
(10620 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

Cisco 300-207 Free Practice Questions

Q1. Who or what calculates the signature fidelity rating? 

A. the signature author 

B. Cisco Professional Services 

C. the administrator 

D. the security policy 

Answer:

Q2. Which Cisco Web Security Appliance deployment mode requires minimal change to endpoint devices? 

A. Transparent Mode 

B. Explicit Forward Mode 

C. Promiscuous Mode 

D. Inline Mode 

Answer:

Q3. Which three administrator actions are used to configure IP logging in Cisco IME? (Choose three.) 

A. Select a virtual sensor. 

B. Enable IP logging. 

C. Specify the host IP address. 

D. Set the logging duration. 

E. Set the number of packets to capture. 

F. Set the number of bytes to capture. 

Answer: A,C,D 

Q4. Within Cisco IPS anomaly detection, what is the default IP range of the external zone? 

A. 0.0.0.0 0.0.0.0 

B. 0.0.0.0 - 255.255.255.255 

C. 0.0.0.0/8 

D. the network of the management interface 

Answer:

Q5. Which five system management protocols are supported by the Intrusion Prevention System? (Choose five.) 

A. SNMPv2c 

B. SNMPv1 

C. SNMPv2 

D. SNMPv3 

E. syslog 

F. SDEE 

G. SMTP 

Answer: A,B,C,F,G 

Q6. Which three pieces of information are required to implement transparent user identification using Context Directory Agent? (Choose three.) 

A. the server name of the global catalog domain controller 

B. the server name where Context Directory Agent is installed 

C. the backup Context Directory Agent 

D. the primary Context Directory Agent 

E. the shared secret 

F. the syslog server IP address 

Answer: B,D,E 

Q7. What three alert notification options are available in Cisco IntelliShield Alert Manager? (Choose three.) 

A. Alert Summary as Text 

B. Complete Alert as an HTML Attachment 

C. Complete Alert as HTML 

D. Complete Alert as RSS 

E. Alert Summary as Plain Text 

F. Alert Summary as MMS 

Answer: A,B,C 

Q8. Which signature definition is virtual sensor 0 assigned to use? 

A. rules0 

B. vs0 

C. sig0 

D. ad0 

E. ad1 

F. sigl 

Answer:

Explanation: 

This is the default signature. You can create multiple security policies and apply them to individual virtual sensors. A security policy is made up of a signature definition policy, an event action rules policy, and an anomaly detection policy. Cisco IPS contains a default signature definition policy called sig0, a default event action rules policy called rules0, and a default anomaly detection policy called ad0. You can assign the default policies to a virtual sensor or you can create new policies. 

Q9. Which two statements regarding the basic setup of the Cisco CX for services are correct? (Choose two.) 

A. The Packet capture feature is available for either permitted or dropped packets by default. 

B. Public Certificates can be used for HTTPS Decryption policies. 

C. Public Certificates cannot be used for HTTPS Decryption policies. 

D. When adding a standard LDAP realm, the group attribute will be UniqueMember. 

E. The Packet capture features is available for permitted packets by default. 

Answer: C,E 

Q10. Which is the default IP address and admin port setting for https in the Cisco Web Security Appliance? 

A. http://192.168.42.42:8080 

B. http://192.168.42.42:80 

C. https://192.168.42.42:443 

D. https://192.168.42.42:8443 

Answer:

Q11. When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.) 

A. spam scanning 

B. antivirus scanning 

C. APT detection 

D. rootkit detection 

Answer: A,B 

Q12. What is the authentication method for an encryption envelope that is set to medium security? 

A. The recipient must always enter a password, even if credentials are cached. 

B. A password is required, but cached credentials are permitted. 

C. The recipient must acknowledge the sensitivity of the message before it opens. 

D. The recipient can open the message without authentication. 

Answer:

Q13. The helpdesk was asked to provide a record of delivery for an important email message that a customer claims it did not receive. Which feature of the Cisco Email Security Appliance provides this record? 

A. Outgoing Mail Reports 

B. SMTP Routes 

C. Message Tracking 

D. Scheduled Reports 

E. System Administration 

Answer:

Q14. Which two options are features of the Cisco Email Security Appliance? (Choose two.) 

A. Cisco Anti-Replay Services 

B. Cisco Destination Routing 

C. Cisco Registered Envelope Service 

D. Cisco IronPort SenderBase Network 

Answer: C,D 

Q15. During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by using which command in a policy-map? 

A. cxsc fail 

B. cxsc fail-close 

C. cxsc fail-open 

D. cxssp fail-close 

Answer:

Q16. Which Cisco ESA component receives connections from external mail servers? 

A. MTA 

B. public listener 

C. private listener 

D. recipient access table 

E. SMTP incoming relay agent 

Answer:

START 300-207 EXAM