300-207 Exam - Implementing Cisco Threat Control Solutions (SITCS)

certleader.com

Q1. Which two GUI options display users' activity in Cisco Web Security Appliance?.(Choose two.) 

A. Web Security Manager Identity Identity Name 

B. Security Services Reporting 

C. Reporting Users 

D. Reporting Reports by User Location 

Answer: C,D 

Q2. What are two benefits of using SPAN with promiscuous mode deployment? (Choose two.) 

A. SPAN does not introduce latency to network traffic. 

B. SPAN can perform granular scanning on captures of per-IP-address or per-port monitoring. 

C. Promiscuous Mode can silently block traffic flows on the IDS. 

D. SPAN can analyze network traffic from multiple points. 

Answer: A,D 

Q3. Which Cisco technology combats viruses and malware with virus outbreak filters that are downloaded from Cisco SenderBase? 

A. ASA 

B. WSA 

C. Secure mobile access 

D. IronPort ESA 

E. SBA 

Answer:

Q4. Which Cisco technology is a modular security service that combines a stateful inspection firewall with next-generation application awareness, providing near real-time threat protection? 

A. Cisco ASA 5500 series appliances 

B. Cisco ASA CX Context-Aware Security 

C. WSA 

D. Internet Edge Firewall / IPS 

Answer:

Q5. Which Cisco Web Security Appliance deployment mode requires minimal change to endpoint devices? 

A. Transparent Mode 

B. Explicit Forward Mode 

C. Promiscuous Mode 

D. Inline Mode 

Answer:

Q6. Which two design considerations are required to add the Cisco Email Security Appliance to an existing mail delivery chain? (Choose two.) 

A. Existing MX records should be maintained and policy routing should be used to redirect traffic to the ESA. 

B. Update the MX records to point to the inbound listener interfaces on the ESA. 

C. Update the MX records to point to the outbound listener interfaces on the ESA. 

D. Different Listeners must be used to handle inbound and outbound mail handling. 

E. The ESA should be connected to the same subnet as the Email Server because it maintains only a single routing table. 

F. The ESA can be connected to a DMZ external to the Email Server because it maintains multiple routing tables. 

G. The ESA can be connected to a DMZ external to the Email Server but it maintains only a single routing table. 

H. Mail Listeners by default can share the same IP interface by defining the routes for sending and receiving. 

Answer: B,G 

Q7. An IPS is configured to fail-closed and you observe that all packets are dropped. What is a possible reason for this behavior? 

A. Mainapp is unresponsive. 

B. The global correlation update failed. 

C. The IPS span session failed. 

D. The attack drop file is misconfigured. 

Answer:

Q8. Over the period of one day, several Atomic ARP engine alerts fired on the same IP address. You observe that each time an alert fired, requests on the IP address exceeded replies by the same number. Which configuration could cause this behavior? 

A. The reply-ratio parameter is enabled. 

B. MAC flip is enabled. 

C. The inspection condition is disabled. 

D. The IPS is misconfigured. 

Answer:

Q9. What is the default IP range of the external zone? 

A. 0.0.0.0 0.0.0.0 

B. 0.0.0.0 - 255.255.255.255 

C. 0.0.0.0/8 

D. The network of the management interface 

Answer:

Q10. An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all traffic if the module fails. Which describes the correct configuration? 

A. Inline Mode, Permit Traffic 

B. Inline Mode, Close Traffic 

C. Promiscuous Mode, Permit Traffic 

D. Promiscuous Mode, Close Traffic 

Answer: