Cisco 300-207 Implementing Cisco Threat Control Solutions (SITCS)
2020 Cisco Official New Released 300-207 Q&As
100% Free Download! 100% Pass Guaranteed!
Q1. Which three search parameters are supported by the Email Security Monitor? (Choose three.) A. Destination domain B. Network owner C. MAC address D. Policy requirements E. Internal sender IP address F. Originating domain View AnswerAnswer: A,B,E Q2. The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real t
Q1. Which Cisco WSA is intended for deployment in organizations of more than 6000 users? A. WSA S370 B. WSA S670 C. WSA S370-2RU D. WSA S170 View AnswerAnswer: B Q2. Which three pieces of information are required to implement transparent user identification using Context Directory Agent? (Choose three.) A. the server name of the global catalog domain controller B. the server name where
Q1. You ran the ssh generate-key command on the Cisco IPS and now administrators are unable to connect. Which action can be taken to correct the problem? A. Replace the old key with a new key on the client. B. Run the ssh host-key command. C. Add the administrator IP addresses to the trusted TLS host list on the IPS. D. Run the ssh authorized-keys command. View AnswerAnswer: A Q2. Which t
Q1. What is a primary difference between the web security features of the Cisco WSA and the Cisco ASA NGFW? A. Cisco WSA provides URL filtering, while Cisco ASA NGFW does not. B. Cisco ASA NGFW provides caching services, while Cisco WSA does not. C. Cisco WSA provides web reputation filtering, while Cisco ASA NGFW does not. D. Cisco ASA NGFW provides application visibility and control on all
Q1. Which Cisco IPS deployment mode is best suited for bridged interfaces? A. inline interface pair mode B. inline VLAN pair mode C. inline VLAN group mode D. inline pair mode View AnswerAnswer: B Q2. Which Cisco technology combats viruses and malware with virus outbreak filters that are downloaded from Cisco SenderBase? A. ASA B. WSA C. Secure mobile access D. IronPort ESA E. SBA V
Q1. At which value do custom signatures begin? A. 1024 B. 10000 C. 1 D. 60000 View AnswerAnswer: D Q2. In which way are packets handled when the IPS internal zone is set to "disabled"? A. All packets are dropped to the external zone. B. All packets are dropped to the internal zone. C. All packets are ignored in the internal zone. D. All packets are sent to the default external zone.
Q1. An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all traffic if the module fails. Which describes the correct configuration? A. Inline Mode, Permit Traffic B. Inline Mode, Close Traffic C. Promiscuous Mode, Permit Traffic D. Promiscuous Mode, Close Traffic View AnswerAnswer: B Q2. CCORRECT TEXT View AnswerAnswer: Steps are in Explanation
Q1. A network engineer can assign IPS event action overrides to virtual sensors and configure which three modes? (Choose three.) A. Anomaly detection operational mode B. Inline TCP session tracking mode C. Normalizer mode D. Load-balancing mode E. Inline and Promiscuous mixed mode F. Fail-open and fail-close mode View AnswerAnswer: A,B,C Q2. During initial configuration, the Cisco ASA
Q1. Which Cisco WSA is intended for deployment in organizations of up to 1500 users? A. WSA S370 B. WSA S670 C. WSA S370-2RU D. WSA S170 View AnswerAnswer: D Q2. Which three features does Cisco CX provide? (Choose three.) A. HTTPS traffic decryption and inspection B. Application Visibility and Control C. Category or reputation-based URL filtering D. Email virus scanning E. Applicatio
Q1. Which Cisco ASA configuration command drops traffic if the Cisco ASA CX module fails? A. no fail-open B. fail-close C. fail-close auth-proxy D. auth-proxy View AnswerAnswer: B Q2. Which two Cisco IPS events will generate an IP log? (Choose two.) A. A signature had an event action that was configured with log packets. B. A statically configured IP or IP network criterion was matched.
Q1. Which method does Cisco recommend for collecting streams of data on a sensor that has been virtualized? A. VACL capture B. SPAN C. the Wireshark utility D. packet capture View AnswerAnswer: D Q2. Which three zones are used for anomaly detection? (Choose three.) A. Internal zone B. External zone C. Illegal zone D. Inside zone E. Outside zone F. DMZ zone View AnswerAnswer: A,B,C
Q1. Which two statements about devices within a Cisco ESA cluster are true? (Choose two.) A. Clustered systems must consist of devices in the same hardware series. B. Clustered devices can communicate via either SSH or Cluster Communication Service. C. Clustered devices can communicate only with Cluster Communication Service. D. In-the-cloud devices must be in a separate cluster from on-premi
Q1. Which three functions can Cisco Application Visibility and Control perform within Cisco Cloud Web Security? (Choose three.) A. validation of malicious traffic B. traffic control C. extending Web Security to all computing devices D. application-level classification E. monitoring F. signature tuning View AnswerAnswer: B,D,E Q2. Which signature definition is virtual sensor 0 assigned t
Q1. Which Cisco Web Security Appliance design requires minimal change to endpoint devices? A. Transparent Mode B. Explicit Forward Mode C. Promiscuous Mode D. Inline Mode View AnswerAnswer: A Q2. What are three benefits of the Cisco AnyConnect Secure Mobility Solution? (Choose three.) A. It can protect against command-injection and directory-traversal attacks. B. It provides Internet tr
Q1. What are the two policy types that can use a web reputation profile to perform reputation-based processing? (Choose two.) A. profile policies B. encryption policies C. decryption policies D. access policies View AnswerAnswer: C,D Q2. What is a primary difference between the web security features of the Cisco WSA and the Cisco ASA NGFW? A. Cisco WSA provides URL filtering, while Cisco
Q1. What are two benefits of using SPAN with promiscuous mode deployment? (Choose two.) A. SPAN does not introduce latency to network traffic. B. SPAN can perform granular scanning on captures of per-IP-address or per-port monitoring. C. Promiscuous Mode can silently block traffic flows on the IDS. D. SPAN can analyze network traffic from multiple points. View AnswerAnswer: A,D Q2. At whi