Leading Cisco 300-207 - An Overview 71 to 80
Our pass rate is high to 98.9% and the similarity percentage between our 300-207 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the Cisco 300-207 exam in just one try? I am currently studying for the Cisco 300-207 exam. Latest Cisco 300-207 Test exam practice questions and answers, Try Cisco 300-207 Brain Dumps First.
The article at Testaimer.com going over http://www.testaimer.com/300-207-test is very comprehensive.
Q71. Which Cisco IPS deployment mode is best suited for bridged interfaces?
A. inline interface pair mode
B. inline VLAN pair mode
C. inline VLAN group mode
D. inline pair mode
Q72. Which is the default IP address and admin port setting for https in the Cisco Web Security Appliance?
Q73. Which Cisco Cloud Web Security tool provides URL categorization?
A. Cisco Dynamic Content Analysis Engine
B. Cisco ScanSafe
C. ASA Firewall Proxy
D. Cisco Web Usage Control
Q74. Which two statements about Cisco ESA clusters are true? (Choose two.)
A. A cluster must contain exactly one group.
B. A cluster can contain multiple groups.
C. Clusters are implemented in a client/server relationship.
D. The cluster configuration must be managed by the cluster administrator.
E. The cluster configuration can be created and managed through either the GUI or the CLI.
Q75. Which signature definition is virtual sensor 0 assigned to use?
This is the default signature. You can create multiple security policies and apply them to individual virtual sensors. A security policy is made up of a signature definition policy, an event action rules policy, and an anomaly detection policy. Cisco IPS contains a default signature definition policy called sig0, a default event action rules policy called rules0, and a default anomaly detection policy called ad0. You can assign the default policies to a virtual sensor or you can create new policies.
Q76. Which two GUI options display users' activity in Cisco Web Security Appliance?.(Choose two.)
A. Web Security Manager Identity Identity Name
B. Security Services Reporting
C. Reporting Users
D. Reporting Reports by User Location
Q77. Which three protocols are required when considering firewall rules for email services using a Cisco Email Security Appliance? (Choose three.)
Q78. Which Cisco ESA component receives connections from external mail servers?
B. public listener
C. private listener
D. recipient access table
E. SMTP incoming relay agent
Q79. Which Cisco technology is a modular security service that combines a stateful inspection firewall with next-generation application awareness, providing near real-time threat protection?
A. Cisco ASA 5500 series appliances
B. Cisco ASA CX Context-Aware Security
D. Internet Edge Firewall / IPS
Q80. Which two conditions must you configure in an event action rule to match all IPv4 addresses in the victim range and filter on the complete subsignature range? (Choose two.)
A. Disable event action override.
B. Leave the victim address range unspecified.
C. Set the subsignature ID-range to the default.
D. Set the deny action percentage to 100.
E. Set the deny action percentage to 0.