300-207 Exam - Implementing Cisco Threat Control Solutions (SITCS)

certleader.com

Q1. What Event Action in an IPS signature is used to stop an attacker from communicating with a network using an access-list? 

A. Request Block Host 

B. Deny Attacker Inline 

C. Deny Connection Inline 

D. Deny Packet Inline 

E. Request Block Connection 

Answer:

Q2. Which Cisco technology is a customizable web-based alerting service designed to report threats and vulnerabilities? 

A. Cisco Security Intelligence Operations 

B. Cisco Security IntelliShield Alert Manager Service 

C. Cisco Security Optimization Service 

D. Cisco Software Application Support Service 

Answer:

Q3. Refer to the exhibit. 

Which four rows exhibit the correct WCCP service to protocol assignments? (Choose four.) 

A. Row 1 

B. Row 2 

C. Row 3 

D. Row 4 

E. Row 5 

F. Row 6 

G. Row 7 

H. Row 8 

Answer: B,D,F,H 

Q4. Which Cisco ESA component receives connections from external mail servers? 

A. MTA 

B. public listener 

C. private listener 

D. recipient access table 

E. SMTP incoming relay agent 

Answer:

Q5. What are three features of the Cisco Security Intellishield Alert Manager Service? (Choose three.) 

A. validation of alerts by security analysts 

B. custom notifications 

C. complete threat and vulnerability remediation 

D. vendor-specific threat analysis 

E. workflow-management tools 

F. real-time threat and vulnerability mitigation 

Answer: A,B,E 

Q6. What command alters the SSL ciphers used by the Cisco Email Security Appliance for TLS 

sessions and HTTPS access? 

A. sslconfig 

B. sslciphers 

C. tlsconifg 

D. certconfig 

Answer:

Q7. Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.) 

A. If it is between -1 and +10, the email is accepted 

B. If it is between +1 and +10, the email is accepted 

C. If it is between -3 and -1, the email is accepted and additional emails from the sender are throttled 

D. If it is between -3 and +1, the email is accepted and additional emails from the sender are throttled 

E. If it is between -4 and +1, the email is accepted and additional emails from the sender are throttled 

F. If it is between -10 and -3, the email is blocked 

G. If it is between -10 and -3, the email is sent to the virus and spam engines for additional scanning 

H. If it is between -10 and -4, the email is blocked 

Answer: A,C,F 

Q8. Which three protocols are required when considering firewall rules for email services using a Cisco Email Security Appliance? (Choose three.) 

A. SMTP 

B. HTTP 

C. DNS 

D. SNMP 

E. FTP 

Answer: A,B,C 

Q9. Which two commands are used to verify that CWS redirection is working on a Cisco ASA appliance? (Choose two.) 

A. show scansafe statistics 

B. show webvpn statistics 

C. show service-policy inspect scansafe 

D. show running-config scansafe 

E. show running-config webvpn 

F. show url-server statistics 

Answer: A,C 

Q10. Which five system management and reporting protocols are supported by the Cisco Intrusion Prevention System? (Choose five.) 

A. SNMPv2c 

B. SNMPv1 

C. SNMPv2 

D. SNMPv3 

E. syslog 

F. SDEE 

G. SMTP 

Answer: A,B,C,F,G