300-210 Exam - Implementing Cisco Threat Control Solutions (SITCS)

certleader.com

Q1. Which three statements about Cisco CWS are true'? (Choose three )

A. It provides protection against zero-day threats.

B. Cisco SIO provides it with threat updates in near real time.

C. It supports granular application policies.

D. Its Roaming User Protection feature protects the VPN from malware and data breaches.

E. It supports local content caching.

F. Its Cognitive Threat Analytics feature uses cloud-based analysis and detection to block threats outside the network.

Answer: A B C

Q2. A system administrator wants to know if the email traffic from a remote partner will active special treatment message filters that are created just for them. Which tool on the Cisco Email Security gateway can you use to debug and emulate the flow that a message takes through the work queue?

A. the trace tool

B. centralized or local message tracking

C. the CLI findevent command

D. the CLI grep command

E. the message tracker interface

Answer: A

Q3. Which Cisco Firepower rule action displays a HTTP warning page and resets the connection of HTTP traffic specified in the access control rule ?

A. Interactive Block with Reset

B. Block

C. Allow with Warning

D. Interactive Block

Answer: D

Explanation

http://www.cisco.com/c/en/us/td/docs/security/firesight/541/firepower-module-user-guide/asa-firepower-module

Q4. Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?

A. explicit forward mode

B. Layer 4 Traffic Monitor

C. transparent mode

D. Secure Web Proxy

Answer: B

Q5. Which option lists the minimum requirements to deploy a managed device inline?

A. passive interface, security zone, MTU, and link mode.

B. passive interface, MTU, MDI/MDIX, and link mode.

C. inline interfaces, MTU, MDI/MDIX, and link mode.

D. inline interfaces, security zones, MTU, and link mode.

Answer: A

Q6. Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?

A. explicit forward mode

B. Layer 4 Traffic Monitor

C. transparent mode

D. Secure Web Proxy

Answer: B

Q7. Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.)

A. If it is between -1 and +10, the email is accepted

B. If it is between +1 and +10, the email is accepted

C. If it is between -3 and -1, the email is accepted and additional emails from the sender are throttled

D. If it is between -3 and +1, the email is accepted and additional emails from the sender are throttled

E. If it is between -4 and +1, the email is accepted and additional emails from the sender are throttled

F. If it is between -10 and -3, the email is blocked

G. If it is between -10 and -3, the email is sent to the virus and spam engines for additional scanning

H. If it is between -10 and -4, the email is blocked

Answer: A C F

Q8. Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.)

A. If it is between -1 and +10, the email is accepted

B. If it is between +1 and +10, the email is accepted

C. If it is between -3 and -1, the email is accepted and additional emails from the sender are throttled

D. If it is between -3 and +1, the email is accepted and additional emails from the sender are throttled

E. If it is between -4 and +1, the email is accepted and additional emails from the sender are throttled

F. If it is between -10 and -3, the email is blocked

G. If it is between -10 and -3, the email is sent to the virus and spam engines for additional scanning

H. If it is between -10 and -4, the email is blocked

Answer: A C F