The Secret of 300-207 latest exam

Want to know Actualtests 300-207 Exam practice test features? Want to lear more about Cisco Implementing Cisco Threat Control Solutions (SITCS) certification experience? Study Practical Cisco 300-207 answers to Renovate 300-207 questions at Actualtests. Gat a success with an absolute guarantee to pass Cisco 300-207 (Implementing Cisco Threat Control Solutions (SITCS)) test on your first attempt.

Q11. The security team needs to limit the number of e-mails they receive from the Intellishield Alert Service. Which three parameters can they adjust to restrict alerts to specific product sets? (Choose three.) 

A. Vendor 

B. Chassis/Module 

C. Device ID 

D. Service Contract 

E. Version/Release 

F. Service Pack/Platform 

Answer: A,E,F 


Q12. A Cisco Web Security Appliance's policy can provide visibility and control of which two elements? (Choose two.) 

A. Voice and Video Applications 

B. Websites with a reputation between -100 and -60 

C. Secure websites with certificates signed under an unknown CA 

D. High bandwidth websites during business hours 

Answer: C,D 


Q13. Which centralized reporting function of the Cisco Content Security Management Appliance 

aggregates data from multiple Cisco ESA devices? 

A. message tracking 

B. web tracking 

C. system tracking 

D. logging 

Answer:


Q14. A Cisco Email Security Appliance uses which message filter to drop all executable attachments entering and leaving the Cisco Email Security Appliance? 

A. drop-exE. if (attachment-filename == "\\.exe$") OR (attachment-filetype == "exe") { drop(); } 

B. drop-exE. if (recv-listener == "InboundMail" ) AND ( (attachment-filename == "\\.exe$") OR (attachment-filetype == "exe")) { drop(); } 

C. drop-exe! if (attachment-filename == "\\.exe$") OR (attachment-filetype == "exe") { drop(); } 

D. drop-exe! if (recv-listener == "InboundMail" ) AND ( (attachment-filename == "\\.exe$") OR (attachment-filetype == "exe")) { drop(); } 

Answer:


Q15. Which two statements about Cisco Cloud Web Security functionality are true? (Choose two.) 

A. It integrates with Cisco Integrated Service Routers. 

B. It supports threat avoidance and threat remediation. 

C. It extends web security to the desktop, laptop, and PDA. 

D. It integrates with Cisco.ASA Firewalls. 

Answer: A,D 


Q16. What is the default antispam policy for positively identified messages? 

A. Drop 

B. Deliver and Append with [SPAM] 

C. Deliver and Prepend with [SPAM] 

D. Deliver and Alternate Mailbox 

Answer:


Q17. Which two conditions must you configure in an event action rule to match all IPv4 addresses in the victim range and filter on the complete subsignature range? (Choose two.) 

A. Disable event action override. 

B. Leave the victim address range unspecified. 

C. Set the subsignature ID-range to the default. 

D. Set the deny action percentage to 100. 

E. Set the deny action percentage to 0. 

Answer: B,C 


Q18. During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by using which command in a policy-map? 

A. cxsc fail 

B. cxsc fail-close 

C. cxsc fail-open 

D. cxssp fail-close 

Answer:


Q19. Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.) 

A. If it is between -1 and +10, the email is accepted 

B. If it is between +1 and +10, the email is accepted 

C. If it is between -3 and -1, the email is accepted and additional emails from the sender are throttled 

D. If it is between -3 and +1, the email is accepted and additional emails from the sender are throttled 

E. If it is between -4 and +1, the email is accepted and additional emails from the sender are throttled 

F. If it is between -10 and -3, the email is blocked 

G. If it is between -10 and -3, the email is sent to the virus and spam engines for additional scanning 

H. If it is between -10 and -4, the email is blocked 

Answer: A,C,F 


Q20. Which four statements are correct regarding management access to a Cisco Intrusion Prevention System? (Choose four.) 

A. The Telnet protocol is enabled by default 

B. The Telnet protocol is disabled by default 

C. HTTP is enabled by default 

D. HTTP is disabled by default 

E. SSH is enabled by default 

F. SSH is disabled by default 

G. HTTPS is enabled by default 

H. HTTPS is disabled by default 

Answer: B,D,E,G