300-207 Exam - Implementing Cisco Threat Control Solutions (SITCS)

certleader.com

Q1. Which three administrator actions are used to configure IP logging in Cisco IME? (Choose three.) 

A. Select a virtual sensor. 

B. Enable IP logging. 

C. Specify the host IP address. 

D. Set the logging duration. 

E. Set the number of packets to capture. 

F. Set the number of bytes to capture. 

Answer: A,C,D 

Q2. Which three zones are used for anomaly detection? (Choose three.) 

A. Internal zone 

B. External zone 

C. Illegal zone 

D. Inside zone 

E. Outside zone 

F. DMZ zone 

Answer: A,B,C 

Q3. Which two statements regarding the basic setup of the Cisco CX for services are correct? (Choose two.) 

A. The Packet capture feature is available for either permitted or dropped packets by default. 

B. Public Certificates can be used for HTTPS Decryption policies. 

C. Public Certificates cannot be used for HTTPS Decryption policies. 

D. When adding a standard LDAP realm, the group attribute will be UniqueMember. 

E. The Packet capture features is available for permitted packets by default. 

Answer: C,E 

Q4. What is the default antispam policy for positively identified messages within the Cisco Email Security Appliance? 

A. Drop 

B. Deliver and Append with [SPAM] 

C. Deliver and Prepend with [SPAM] 

D. Deliver and Alternate Mailbox 

Answer:

Q5. Which three statements about Cisco CWS are true? (Choose three.) 

A. It provides protection against zero-day threats. 

B. Cisco SIO provides it with threat updates in near real time. 

C. It supports granular application policies. 

D. Its Roaming User Protection feature protects the VPN from malware and data breaches. 

E. It supports local content caching. 

F. Its Cognitive Threat Analytics feature uses cloud-based analysis and detection to block threats outside the network. 

Answer: A,B,C 

Q6. Which statement about Cisco IPS Manager Express is true? 

A. It provides basic device management for large-scale deployments. 

B. It provides a GUI for configuring IPS sensors and security modules. 

C. It enables communication with Cisco ASA devices that have no administrative access. 

D. It provides greater security than simple ACLs. 

Answer:

Q7. Which command disables SSH access for administrators on the Cisco ESA? 

A. interfaceconfig 

B. sshconfig 

C. sslconfig 

D. systemsetup 

Answer:

Q8. To what extent will the Cisco IPS sensor contribute data to the Cisco SensorBase network? 

A. It will not contribute to the SensorBase network. 

B. It will contribute to the SensorBase network, but will withhold some sensitive information 

C. It will contribute the victim IP address and port to the SensorBase network. 

D. It will not contribute to Risk Rating adjustments that use information from the SensorBase network. 

Answer:

Explanation: 

To configure network participation, follow these steps:.Step 1.Log in to IDM using an account with administrator privileges..Step 2.Choose Configuration > Policies > Global Correlation > Network Participation..Step 3.To turn on network participation, click the Partial or Full radio button:..Partial—Data is contributed to the SensorBase Network, but data considered potentially sensitive is filtered out and never sent...Full—All data is contributed to the SensorBase Network 

In this case, we can see that this has been turned off as shown below: 

Q9. Which two Cisco IPS events will generate an IP log? (Choose two.) 

A. A signature had an event action that was configured with log packets. 

B. A statically configured IP or IP network criterion was matched. 

C. A dynamically configured IP address or IP network was matched. 

D. An attack produced a response action. 

Answer: A,B 

Q10. Refer to the exhibit. 

The system administrator of mydomain.com was informed that one of the users in his environment received spam from an Internet sender. Message tracking shows that the emails for this user were not scanned by antispam. Why did the Cisco Email Security gateway fail to do a spam scan on emails for user@mydomain.com? 

A. The remote MTA activated the SUSPECTLIST sender group. 

B. The Cisco Email Security gateway created duplicates of the message. 

C. The user user@mydomain.com matched an inbound rule with antispam disabled. 

D. The user bob@mydomain.com matched an inbound rule with antispam disabled. 

Answer: