+ All Categories
Home > Documents > Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct...

Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct...

Date post: 27-Aug-2018
Category:
Upload: phungnguyet
View: 214 times
Download: 0 times
Share this document with a friend
25
Cisco 300-207 Exam Questions & Answers Number : 300-207 Passing Score : 800 Time Limit : 120 min File Version : 32.8 http://www.gratisexam.com/ Exam Code: 300-207 Exam Name: Implementing Cisco Threat Control Solutions
Transcript
Page 1: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

Cisco 300-207 Exam Questions & Answers

Number: 300-207Passing Score: 800Time Limit: 120 minFile Version: 32.8

http://www.gratisexam.com/

Exam Code: 300-207

Exam Name: Implementing Cisco Threat Control Solutions

Page 2: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

Exact-Exams

QUESTION 1During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails byusing which command in a policy-map?

A. cxsc failB. cxsc fail-closeC. cxsc fail-openD. cxssp fail-close

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 2A network engineer may use which three types of certificates when implementing HTTPS decryptionservices on the ASA CX? (Choose three.)

A. Self Signed Server CertificateB. Self Signed Root CertificateC. Microsoft CA Server CertificateD. Microsoft CA Subordinate Root CertificateE. LDAP CA Server CertificateF. LDAP CA Root CertificateG. Public Certificate Authority Server CertificateH. Public Certificate Authority Root Certificate

Correct Answer: BDFSection: (none)Explanation

Explanation/Reference:

QUESTION 3Cisco's ASA CX includes which two URL categories? (Choose two.)

A. Proxy AvoidanceB. DropboxC. Hate SpeechD. FacebookE. Social NetworkingF. Instant Messaging and Video Messaging

Correct Answer: CESection: (none)Explanation

Explanation/Reference:

QUESTION 4A Cisco Web Security Appliance's policy can provide visibility and control of which two elements? (Choosetwo.)

Page 3: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

A. Voice and Video ApplicationsB. Websites with a reputation between -100 and -60C. Secure websites with certificates signed under an unknown CAD. High bandwidth websites during business hours

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 5Which Cisco Cloud Web Security tool provides URL categorization?

http://www.gratisexam.com/

A. Cisco Dynamic Content Analysis EngineB. Cisco ScanSafeC. ASA Firewall ProxyD. Cisco Web Usage Control

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 6Which three functions can Cisco Application Visibility and Control perform? (Choose three.)

A. Validation of malicious trafficB. Traffic controlC. Extending Web Security to all computing devicesD. Application-level classificationE. MonitoringF. Signature tuning

Correct Answer: BDESection: (none)Explanation

Explanation/Reference:

QUESTION 7What is the default antispam policy for positively identified messages?

A. DropB. Deliver and Append with [SPAM]C. Deliver and Prepend with [SPAM]

Page 4: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

D. Deliver and Alternate Mailbox

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 8What is the default CX Management 0/0 IP address on a Cisco ASA 5512-X appliance?

A. 192.168.1.1B. 192.168.1.2C. 192.168.1.3D. 192.168.1.4E. 192.168.1.5F. 192.168.8.8

Correct Answer: FSection: (none)Explanation

Explanation/Reference:

QUESTION 9What CLI command configures IP-based access to restrict GUI and CLI access to a Cisco Email Securityappliance's administrative interface?

A. adminaccessconfigB. sshconfigC. sslconfigD. ipaccessconfig

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 10An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all trafficif the module fails. Which describes the correct configuration?

A. Inline Mode, Permit TrafficB. Inline Mode, Close TrafficC. Promiscuous Mode, Permit TrafficD. Promiscuous Mode, Close Traffic

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 11Which three zones are used for anomaly detection? (Choose three.)

Page 5: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

A. Internal zoneB. External zoneC. Illegal zoneD. Inside zoneE. Outside zoneF. DMZ zone

Correct Answer: ABCSection: (none)Explanation

Explanation/Reference:

QUESTION 12When learning accept mode is set to auto, and the action is set to rotate, when is the KB created and used?

A. It is created every 24 hours and used for 24 hours.B. It is created every 24 hours, but the current KB is used.C. It is created every 1 hour and used for 24 hours.D. A KB is created only in manual mode.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 13What is the CLI command to create a new Message Filter in a Cisco Email Security Appliance?

A. filterconfigB. filters newC. messagefiltersD. policyconfig-- inbound or outbound-- filters

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 14Which is the default IP address and admin port setting for https in the Cisco Web Security Appliance?

A. http://192.168.42.42:8080B. http://192.168.42.42:80C. https://192.168.42.42:443D. https://192.168.42.42:8443

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Page 6: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

QUESTION 15Which port is used for CLI Secure shell access?

A. Port 23B. Port 25C. Port 22D. Port 443

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 16Which Cisco technology prevents targeted malware attacks, provides data loss prevention and spamprotection, and encrypts email?

A. SBAB. secure mobile accessC. IPv6 DMZ web serviceD. ESA

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 17Which Cisco technology combats viruses and malware with virus outbreak filters that are downloaded fromCisco SenderBase?

A. ASAB. WSAC. Secure mobile accessD. IronPort ESAE. SBA

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 18Which Cisco WSA is intended for deployment in organizations of up to 1500 users?

A. WSA S370B. WSA S670C. WSA S370-2RUD. WSA S170

Correct Answer: DSection: (none)

Page 7: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

Explanation

Explanation/Reference:

QUESTION 19Which command verifies that the correct CWS license key information was entered on the Cisco ASA?

A. sh run scansafe serverB. sh run scansafeC. sh run serverD. sh run server scansafe

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 20Which four statements are correct regarding management access to a Cisco Intrusion Prevention System?(Choose four.)

A. The Telnet protocol is enabled by defaultB. The Telnet protocol is disabled by defaultC. HTTP is enabled by defaultD. HTTP is disabled by defaultE. SSH is enabled by defaultF. SSH is disabled by defaultG. HTTPS is enabled by defaultH. HTTPS is disabled by default

Correct Answer: BDEGSection: (none)Explanation

Explanation/Reference:

QUESTION 21Which two GUI options display users' activity in Cisco Web Security Appliance? (Choose two.)

A. Web Security Manager Identity Identity NameB. Security Services ReportingC. Reporting UsersD. Reporting Reports by User Location

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:

QUESTION 22The security team needs to limit the number of e-mails they receive from the Intellishield Alert Service.Which three parameters can they adjust to restrict alerts to specific product sets? (Choose three.)

Page 8: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

A. VendorB. Chassis/ModuleC. Device IDD. Service ContractE. Version/ReleaseF. Service Pack/Platform

Correct Answer: AEFSection: (none)Explanation

Explanation/Reference:

QUESTION 23What three alert notification options are available in Cisco IntelliShield Alert Manager? (Choose three.)

A. Alert Summary as TextB. Complete Alert as an HTML AttachmentC. Complete Alert as HTMLD. Complete Alert as RSSE. Alert Summary as Plain TextF. Alert Summary as MMS

Correct Answer: ABCSection: (none)Explanation

Explanation/Reference:

QUESTION 24With Cisco IDM, which rate limit option specifies the maximum bandwidth for rate-limited traffic?

A. protocolB. rateC. bandwidthD. limit

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 25Which Cisco monitoring solution displays information and important statistics for the security devices in anetwork?

A. Cisco Prime LAN ManagementB. Cisco ASDM Version 5.2C. Cisco Threat Defense SolutionD. Syslog ServerE. TACACS+

Correct Answer: BSection: (none)

Page 9: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

Explanation

Explanation/Reference:

QUESTION 26Which three search parameters are supported by the Email Security Monitor? (Choose three.)

A. Destination domainB. Network ownerC. MAC addressD. Policy requirementsE. Internal sender IP addressF. Originating domain

Correct Answer: ABESection: (none)Explanation

Explanation/Reference:

QUESTION 27Which Cisco Security IntelliShield Alert Manager Service component mitigates new botnet, phishing, andweb-based threats?

A. the IntelliShield Threat Outbreak AlertB. IntelliShield Alert Manager vulnerability alertsC. the IntelliShield Alert Manager historical databaseD. the IntelliShield Alert Manager web portalE. the IntelliShield Alert Manager back-end intelligence engine

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 28A network engineer can assign IPS event action overrides to virtual sensors and configure which threemodes? (Choose three.)

A. Anomaly detection operational modeB. Inline TCP session tracking modeC. Normalizer modeD. Load-balancing modeE. Inline and Promiscuous mixed modeF. Fail-open and fail-close mode

Correct Answer: ABCSection: (none)Explanation

Explanation/Reference:

QUESTION 29Which set of commands changes the FTP client timeout when the sensor is communicating with an FTP

Page 10: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

server?

A. sensor# configure terminalsensor(config)# service sensorsensor(config-hos)# network-settingssensor(config-hos-net)# ftp-timeout 500

B. sensor# configure terminalsensor(config)# service hostsensor(config-hos)# network-settings parameter ftp sensor(config-hos-net)# ftp-timeout 500

C. sensor# configure terminalsensor(config)# service hostsensor(config-hos)# network-settingssensor(config-hos-net)# ftp-timeout 500

D. sensor# configure terminalsensor(config)# service networksensor(config-hos)# network-settingssensor(config-hos-net)# ftp-timeout 500

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 30What are the initial actions that can be performed on an incoming SMTP session by the workqueue of aCisco Email Security Appliance?

A. Accept, Reject, Relay, TCPRefuseB. LDAP Verification, Envelope Sender Verification, Bounce Verification, Alias Table VerificationC. Recipient Access Table Verification, Host DNS Verification, Masquerading, Spam Payload CheckD. SMTP Authentication, SBRS Verification, Sendergroup matching, DNS host verification

Correct Answer: ASection: (none)Explanation

Explanation/Reference:

QUESTION 31Which version of AsyncOS for web is required to deploy the Web Security Appliance as a CWS connector?

A. AsyncOS version 7.7.xB. AsyncOS version 7.5.xC. AsyncOS version 7.5.7D. AsyncOS version 7.5.0

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 32What are three benefits of the Cisco AnyConnect Secure Mobility Solution? (Choose three.)

A. It can protect against command-injection and directory-traversal attacks.

Page 11: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

B. It provides Internet transport while maintaining corporate security policies.C. It provides secure remote access to managed computers.D. It provides clientless remote access to multiple network-based systems.E. It enforces security policies, regardless of the user location.F. It uses ACLs to determine best-route connections for clients in a secure environment.

Correct Answer: BCESection: (none)Explanation

Explanation/Reference:

QUESTION 33Which Cisco technology secures the network through malware filtering, category-based control, andreputation-based control?

A. Cisco ASA 5500 Series appliancesB. Cisco remote-access VPNsC. Cisco IronPort WSAD. Cisco IPS

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 34Which Cisco technology is a modular security service that combines a stateful inspection firewall with next-generation application awareness, providing near real-time threat protection?

A. Cisco ASA 5500 series appliancesB. Cisco ASA CX Context-Aware SecurityC. WSAD. Internet Edge Firewall / IPS

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

QUESTION 35During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails byusing which command in a policy-map?

A. cxsc failB. cxsc fail-closeC. cxsc fail-openD. cxssp fail-close

Correct Answer: BSection: (none)Explanation

Explanation/Reference:

Page 12: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

QUESTION 36Cisco AVC allows control of which three of the following? (Choose three.)

A. FacebookB. LWAPPC. IPv6D. MySpaceE. TwitterF. WCCP

Correct Answer: ADESection: (none)Explanation

Explanation/Reference:

QUESTION 37The Web Security Appliance has identities defined for faculty and staff, students, and default access. Thefaculty and staff identity identifies users based on the source network and authenticated credentials. Theidentity for students identifies users based on the source network along with successful authenticationcredentials. The global identity is for guest users not authenticated against the domain.

Recently, a change was made to the organization's security policy to allow faculty and staff access to asocial network website, and the security group changed the access policy for faculty and staff to allow thesocial networking category.

Which are the two most likely reasons that the category is still being blocked for a faculty and staff user?(Choose two.)

A. The user is being matched against the student policy because the user did not enter credentials.B. The user is using an unsupported browser so the credentials are not working.C. The social networking URL was entered into a custom URL category that is blocked in the access

policy.D. The user is connected to the wrong network and is being blocked by the student policy.E. The social networking category is being allowed but the AVC policy is still blocking the website.

Correct Answer: CESection: (none)Explanation

Explanation/Reference:

QUESTION 38Which three options are IPS signature classifications? (Choose three.)

A. tuned signaturesB. response signaturesC. default signaturesD. custom signaturesE. preloaded signaturesF. designated signatures

Correct Answer: ACDSection: (none)Explanation

Page 13: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

Explanation/Reference:

QUESTION 39At which value do custom signatures begin?

A. 1024B. 10000C. 1D. 60000

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

QUESTION 40Which two commands are valid URL filtering commands? (Choose two.)

A. url-server (DMZ) vendor smartfilter host 10.0.1.1B. url-server (DMZ) vendor url-filter host 10.0.1.1C. url-server (DMZ) vendor n2h2 host 10.0.1.1D. url-server (DMZ) vendor CISCO host 10.0.1.1E. url-server (DMZ) vendor web host 10.0.1.1

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:

QUESTION 41

Page 14: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,
Page 15: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

Which signature definition is virtual sensor 0 assigned to use?

A. rules0B. vs0C. sig0D. ad0E. ad1F. sigl

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:This is the default signature.You can create multiple security policies and apply them to individual virtual sensors. A security policy ismade up of a signature definition policy, an event action rules policy, and an anomaly detection policy.Cisco IPS contains a default signature definition policy called sig0, a default event action rules policy calledrules0, and a default anomaly detection policy called ad0. You can assign the default policies to a virtualsensor or you can create new policies.

QUESTION 42

Page 16: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

What action will the sensor take regarding IP addresses listed as known bad hosts in the CiscoSensorBase network?

A. Global correlation is configured in Audit mode fortesting the feature without actually denying any hosts.B. Global correlation is configured in Aggressive mode, which has a very aggressive effect on deny

actions.C. It will not adjust risk rating values based on the known bad hosts list.D. Reputation filtering is disabled.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:This can be seen on the Globabl Correlation Inspection/Reputation tab show below:

Page 17: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

QUESTION 43

Page 18: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,
Page 19: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

To what extent will the Cisco IPS sensor contribute data to the Cisco SensorBase network?

A. It will not contribute to the SensorBase network.B. It will contribute to the SensorBase network, but will withhold some sensitive informationC. It will contribute the victim IP address and port to the SensorBase network.D. It will not contribute to Risk Rating adjustments that use information from the SensorBase network.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:To configure network participation, follow these steps:Step 1 Log in to IDM using an account with administrator privileges. Step 2 Choose Configuration > Policies> Global Correlation > Network Participation. Step 3 To turn on network participation, click the Partial or Fullradio button:·Partial--Data is contributed to the SensorBase Network, but data considered potentially sensitive is filteredout and never sent.·Full--All data is contributed to the SensorBase Network

In this case, we can see that this has been turned off as shown below:

QUESTION 44

Page 20: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,
Page 21: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

What is the status of OS Identification?

A. It is only enabled to identify "Cisco IOS" OS using statically mapped OS fingerprintingB. OS mapping information will not be used for Risk Rating calculations.C. It is configured to enable OS mapping and ARR only for the 10.0.0.0/24 network.D. It is enabled for passive OS fingerprinting for all networks.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:Understanding Passive OS FingerprintingPassive OS fingerprinting lets the sensor determine the OS that hosts are running. The sensor analyzesnetwork traffic between hosts and stores the OS of these hosts with their IP addresses. The sensorinspects TCP SYN and SYNACK packets exchanged on the network to determine the OS type.The sensor then uses the OS of the target host OS to determine the relevance of the attack to the victim bycomputing the attack relevance rating component of the risk rating. Based on the relevance of the attack,the sensor may alter the risk rating of the alert for the attack and/or the sensor may filter the alert for theattack. You can then use the risk rating to reduce the number of false positive alerts (a benefit in IDS mode)or definitively drop suspicious packets (a benefit in IPS mode). Passive OS fingerprinting also enhances thealert output by reporting the victim OS, the source of the OS identification, and the relevance to the victimOS in the alert. Passive OS fingerprinting consists of three components: ·Passive OS learning Passive OSlearning occurs as the sensor observes traffic on the network. Based on the characteristics of TCP SYNand SYNACK packets, the sensor makes a determination of the OS running on the host of the source IPaddress. ·User-configurable OS identification You can configure OS host mappings, which take precedenceover learned OS mappings. ·Computation of attack relevance rating and risk rating

QUESTION 45

Page 22: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

Correct Answer: Steps are in Explanation below:Section: (none)Explanation

Explanation/Reference:Explanation:First, enable the Gig 0/0 and Gig 0/1 interfaces:

Second, create the pair under the "interface pairs" tab:

Page 23: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

Then, apply the HIGHRISK action rule to the newly created interface pair:

Then apply the same for the MEDIUMRISK traffic (deny attacker inline)

Page 24: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

Finally. Log the packets for the LOWRICK event:

When done it should look like this:

Page 25: Exam Code: 300-207 Exam Name: Implementing Cisco Threat ... · D. IronPort ESA E. SBA Correct Answer: D ... B. LDAP Verification, Envelope Sender Verification, Bounce Verification,

http://www.gratisexam.com/


Recommended