Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 300-207
100% Free Download! 100% Pass Guaranteed!
Implementing Cisco Threat Control Solutions
Question No: 41
During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by using which command in a policy-map?
-
cxsc fail
-
cxsc fail-close
-
cxsc fail-open
-
cxssp fail-close
Answer: B
Question No: 42
Cisco’s ASA CX includes which two URL categories? (Choose two.)
-
Proxy Avoidance
-
Dropbox
-
Hate Speech
-
Facebook
-
Social Networking
-
Instant Messaging and Video Messaging
Answer: C,E
Question No: 43
Which two statements about Cisco ESA clusters are true? (Choose two.)
-
A cluster must contain exactly one group.
-
A cluster can contain multiple groups.
-
Clusters are implemented in a client/server relationship.
-
The cluster configuration must be managed by the cluster administrator.
-
The cluster configuration can be created and managed through either the GUI or the CLI.
Answer: B,E
Question No: 44
Which two options are known limitations in deploying an IPS sensor in promiscuous mode versus inline mode? (Choose two).
-
It is less effective in stopping email viruses and automated attackers such as worms.
-
It requires less of an operational response because the attacks are blocked automatically without operational team support.
-
Sensors in this deployment cannot stop the trigger packet and are not guaranteed to stop a connection.
-
A sensor failure affects network functionality.
-
It does not see the same traffic.
Answer: A,C
Question No: 45
What is a value that Cisco ESA can use for tracing mail flow?
-
the FQDN of the source IP address
-
the FQDN of the destination IP address
-
the destination IP address
-
the source IP address
Answer: A
Question No: 46
Which command establishes a virtual console session to a CX module within a Cisco Adaptive Security Appliance?
-
session 1 ip address
-
session 2 ip address
-
session 1
-
session ips console
-
session cxsc console
Answer: E
Question No: 47
Which two pieces of information are required to implement transparent user identification using context Directory Agent? (Choose two.)
-
the shared secret
-
the server name where Context Directory Agent is installed
-
the server name of the global catalog domaint controller
-
the syslog server IP address
Answer: A,B
Question No: 48
Which feature does Acceptable Use Controls use to implement Cisco AVC?
-
ISA
-
Cisco Web Usage Controls
-
Cisco WSA
-
Cisco ESA
Answer: B
Question No: 49
Which four methods are used to deploy transparent mode traffic redirection? (Choose four.)
-
PAC files
-
Web Cache Communication Protocol
-
policy-based routing
-
Microsoft GPO
-
Layer 4 switch
-
DHCP server
-
Layer 7 switch
-
manual browser configuration
Answer: B,C,E,G
Question No: 50
In which way are packets handled when the IPS internal zone is set to quot;disabledquot;?
-
All packets are dropped to the external zone.
-
All packets are dropped to the internal zone.
-
All packets are ignored in the internal zone.
-
All packets are sent to the default external zone.
Answer: D
100% Ensurepass Free Download!
–300-207 PDF
100% Ensurepass Free Guaranteed!
–300-207 Dumps
EnsurePass | ExamCollection | Testking | |
---|---|---|---|
Lowest Price Guarantee | Yes | No | No |
Up-to-Dated | Yes | No | No |
Real Questions | Yes | No | No |
Explanation | Yes | No | No |
PDF VCE | Yes | No | No |
Free VCE Simulator | Yes | No | No |
Instant Download | Yes | No | No |