How Does Exambible Cisco 300-207 training Work?


The article at Testaimer.com going over http://www.testaimer.com/300-207-test is very comprehensive.

Q51. A Cisco Email Security Appliance uses which message filter to drop all executable attachments entering and leaving the Cisco Email Security Appliance? 

A. drop-exE. if (attachment-filename == "\.exe$") OR (attachment-filetype == "exe") { drop(); } 

B. drop-exE. if (recv-listener == "InboundMail" ) AND ( (attachment-filename == "\.exe$") OR (attachment-filetype == "exe")) { drop(); } 

C. drop-exe! if (attachment-filename == "\.exe$") OR (attachment-filetype == "exe") { drop(); } 

D. drop-exe! if (recv-listener == "InboundMail" ) AND ( (attachment-filename == "\.exe$") OR (attachment-filetype == "exe")) { drop(); } 

Answer:


Q52. Which two statements about Signature 1104 are true? (Choose two.) 

A. This is a custom signature. 

B. The severity level is High. 

C. This signature has triggered as indicated by the red severity icon. 

D. Produce Alert is the only action defined. 

E. This signature is enabled, but inactive, as indicated bythe/0 to that follows the signature number. 

Answer: B,D 

Explanation: 

This can be seen here where signature 1004 is the 5th one down: 


Q53. The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs). 

The simulator will provide access to the graphical user interfaces of one Cisco ASA and one Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are implemented in the simulator. The options that have been implemented are sufficient to determine the best answer to each of the questions that are presented. 

Your task is to examine the details available in the simulated graphical user interfaces and select the best answer. 

Between the Cisco ASA configuration and the Cisco WSA configuration, what is true with respect to redirected ports? 

A. Both are configured for port 80 only. 

B. Both are configured for port 443 only. 

C. Both are configured for both port 80 and 443. 

D. Both are configured for ports 80, 443 and 3128. 

E. There is a configuration mismatch on redirected ports. 

Answer:

Explanation: This can be seen from the WSA Network tab shown below: 

\psfHomeDesktopScreen Shot 2015-01-27 at 9.42.49 AM.png 


Q54. Which Cisco Cloud Web Security Connector feature allows access by all of an organization's users while applying Active Directory group policies? 

A. a company authentication key 

B. a group authentication key 

C. a PAC file 

D. proxy forwarding 

E. a user authentication key 

Answer:


Q55. Refer to the exhibit. 

What Cisco ESA CLI command generated the output? 

A. smtproutes 

B. tophosts C. hoststatus 

D. workqueuestatus 

Answer:


Q56. Which Cisco WSA is intended for deployment in organizations of more than 6000 users? 

A. WSA S370 

B. WSA S670 

C. WSA S370-2RU 

D. WSA S170 

Answer:


Q57. Which command disables SSH access for administrators on the Cisco ESA? 

A. interfaceconfig 

B. sshconfig 

C. sslconfig 

D. systemsetup 

Answer:


Q58. Which IPS feature allows you to aggregate multiple IPS links over a single port channel? 

A. UDLD 

B. ECLB 

C. LACP 

D. PAgP 

Answer:


Q59. Which three administrator actions are used to configure IP logging in Cisco IME? (Choose three.) 

A. Select a virtual sensor. 

B. Enable IP logging. 

C. Specify the host IP address. 

D. Set the logging duration. 

E. Set the number of packets to capture. 

F. Set the number of bytes to capture. 

Answer: A,C,D 


Q60. What are two benefits of using SPAN with promiscuous mode deployment? (Choose two.) 

A. SPAN does not introduce latency to network traffic. 

B. SPAN can perform granular scanning on captures of per-IP-address or per-port monitoring. 

C. Promiscuous Mode can silently block traffic flows on the IDS. 

D. SPAN can analyze network traffic from multiple points. 

Answer: A,D