A Review Of Highest Quality 300-207 preparation


The article at Testaimer.com going over http://www.testaimer.com/300-207-test is very comprehensive.

2017 Apr 300-207 exam price

Q21. Which Cisco Security IntelliShield Alert Manager Service component mitigates new botnet, phishing, and web-based threats? 

A. the IntelliShield Threat Outbreak Alert 

B. IntelliShield Alert Manager vulnerability alerts 

C. the IntelliShield Alert Manager historical database 

D. the IntelliShield Alert Manager web portal 

E. the IntelliShield Alert Manager back-end intelligence engine 

Answer:


Q22. Cisco’s ASA CX includes which two URL categories? (Choose two.) 

A. Proxy Avoidance 

B. Dropbox 

C. Hate Speech 

D. Facebook 

E. Social Networking 

F. Instant Messaging and Video Messaging 

Answer: C,E 


Q23. Which command is used to enable strong ciphers on the Cisco Web Security Appliance? 

A. interfaceconfig 

B. strictssl 

C. etherconfig 

D. adminaccessconfig 

Answer:


Q24. Refer to the exhibit. 

The system administrator of mydomain.com received complaints that some messages that were sent from sender user@somedomain.com were delayed. Message tracking data on the sender shows that an email sample that was received was clean and properly delivered. What is the likely cause of the intermittent delays? 

A. The remote MTA has a.SenderBase Reputation Score of -1.0. 

B. The remote MTA is sending emails from RFC 1918 IP addresses. 

C. The remote MTA has activated the SUSPECTLIST sender group. 

D. The remote MTA has activated the default inbound mail policy. 

Answer:


Q25. If learning accept mode is set to "auto" and the knowledge base is loaded only when explicitly requested on the IPS, which statement about the knowledge base is true? 

A. The knowledge base is set to load dynamically. 

B. The knowledge base is set to "save only." 

C. The knowledge base is set to "discarded." 

D. The knowledge base is set to load statically. 

Answer:


Q26. An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all traffic if the module fails. Which describes the correct configuration? 

A. Inline Mode, Permit Traffic 

B. Inline Mode, Close Traffic 

C. Promiscuous Mode, Permit Traffic 

D. Promiscuous Mode, Close Traffic 

Answer:


Q27. Which Cisco technology prevents targeted malware attacks, provides data loss prevention and spam protection, and encrypts email? 

A. SBA 

B. secure mobile access 

C. IPv6 DMZ web service 

D. ESA 

Answer:


Q28. Within Cisco IPS anomaly detection, what is the default IP range of the external zone? 

A. 0.0.0.0 0.0.0.0 

B. 0.0.0.0 - 255.255.255.255 

C. 0.0.0.0/8 

D. the network of the management interface 

Answer:


Q29. What can Cisco Prime Security Manager (PRSM) be used to achieve? 

A. Configure and Monitor Cisco CX Application Visibility and Control, web filtering, access and decryption policies 

B. Configure Cisco ASA connection limits 

C. Configure TCP state bypass in Cisco ASA and IOS 

D. Configure Cisco IPS signature and monitor signature alerts 

E. Cisco Cloud Security on Cisco ASA 

Answer:


Q30. When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.) 

A. spam scanning 

B. antivirus scanning 

C. APT detection 

D. rootkit detection 

Answer: A,B