300-207 Exam - Implementing Cisco Threat Control Solutions (SITCS)

certleader.com

Q1. When a Cisco IPS is deployed in fail-closed mode, what are two conditions that can result in traffic being dropped? (Choose two.) 

A. The signature engine is undergoing the build process. 

B. The SDF failed to load. 

C. The built-in signatures are unavailable. 

D. An ACL is configured. 

Answer: A,B 

Q2. When a Cisco Email Security Appliance joins a cluster, which four settings are inherited? (Choose four.) 

A. IP address 

B. DNS settings 

C. SMTP routes 

D. HAT 

E. RAT 

F. hostname 

G. certificates 

Answer: B,C,D,E 

Q3. A new Cisco IPS device has been placed on the network without prior analysis. Which CLI command shows the most fired signature? 

A. Show statistics virtual-sensor 

B. Show event alert 

C. Show alert 

D. Show version 

Answer:

Q4. Which antispam technology assumes that email from server A, which has a history of distributing spam, is more likely to be spam than email from server B, which does not have a history of distributing spam? 

A. Reputation-based filtering 

B. Context-based filtering 

C. Cisco ESA multilayer approach 

D. Policy-based filtering 

Answer:

Q5. Which command verifies that the correct CWS license key information was entered on the Cisco ASA? 

A. sh run scansafe server 

B. sh run scansafe 

C. sh run server 

D. sh run server scansafe 

Answer:

Q6. Cisco’s ASA CX includes which two URL categories? (Choose two.) 

A. Proxy Avoidance 

B. Dropbox 

C. Hate Speech 

D. Facebook 

E. Social Networking 

F. Instant Messaging and Video Messaging 

Answer: C,E 

Q7. Which two options are characteristics of router-based IPS? (Choose two.) 

A. It supports custom signatures 

B. It supports virtual sensors. 

C. It supports multiple VRFs. 

D. It uses configurable anomaly detection. 

E. Signature definition files have been deprecated. 

Answer: C,E 

Q8. Which command sets the number of packets to log on a Cisco IPS sensor? 

A. ip-log-count number 

B. ip-log-packets number 

C. ip-log-bytes number 

D. ip-log number 

Answer:

Q9. Refer to the exhibit. 

What Cisco ESA CLI command generated the output? 

A. smtproutes 

B. tophosts C. hoststatus 

D. workqueuestatus 

Answer:

Q10. Which two commands are valid URL filtering commands? (Choose two.) 

A. url-server (DMZ) vendor smartfilter host 10.0.1.1 

B. url-server (DMZ) vendor url-filter host 10.0.1.1 

C. url-server (DMZ) vendor n2h2 host 10.0.1.1 

D. url-server (DMZ) vendor CISCO host 10.0.1.1 

E. url-server (DMZ) vendor web host 10.0.1.1 

Answer: A,C