300-207 testing material(81 to 96) for IT learners: Apr 2016 Edition

300-207 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library!


Exam Code: 300-207 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: Implementing Cisco Threat Control Solutions (SITCS)
Certification Provider: Cisco
Free Today! Guaranteed Training- Pass 300-207 Exam.

2016 Apr 300-207 Study Guide Questions:

Q81. A Cisco Web Security Appliance's policy can provide visibility and control of which two elements? (Choose two.) 

A. Voice and Video Applications 

B. Websites with a reputation between -100 and -60 

C. Secure websites with certificates signed under an unknown CA 

D. High bandwidth websites during business hours 

Answer: C,D 

Q82. Which command disables SSH access for administrators on the Cisco ESA? 

A. interfaceconfig 

B. sshconfig 

C. sslconfig 

D. systemsetup 

Answer: A 

Q83. Which method does Cisco recommend for collecting streams of data on a sensor that has been virtualized? 

A. VACL capture 


C. the Wireshark utility 

D. packet capture 

Answer: D 

Q84. Cisco AVC allows control of which three of the following? (Choose three.) 

A. Facebook 


C. IPv6 

D. MySpace 

E. Twitter 


Answer: A,D,E 

Q85. At which value do custom signatures begin? 

A. 1024 

B. 10000 

C. 1 

D. 60000 

Answer: D 

300-207 vce

Leading 300-207 practice test:

Q86. Which two statements about devices within a Cisco ESA cluster are true? (Choose two.) 

A. Clustered systems must consist of devices in the same hardware series. 

B. Clustered devices can communicate via either SSH or Cluster Communication Service. 

C. Clustered devices can communicate only with Cluster Communication Service. 

D. In-the-cloud devices must be in a separate cluster from on-premise devices. 

E. Clustered devices can run different versions of AsyncOS. 

Answer: A,B 

Q87. Which Cisco ESA component receives connections from external mail servers? 


B. public listener 

C. private listener 

D. recipient access table 

E. SMTP incoming relay agent 

Answer: B 

Q88. What action will the sensor take regarding IP addresses listed as known bad hosts in the Cisco SensorBase network? 

A. Global correlation is configured in Audit mode fortesting the feature without actually denying any hosts. 

B. Global correlation is configured in Aggressive mode, which has a very aggressive effect on deny actions. 

C. It will not adjust risk rating values based on the known bad hosts list. 

D. Reputation filtering is disabled. 

Answer: D 


This can be seen on the Globabl Correlation – Inspection/Reputation tab show below: 

Q89. Which three functions can Cisco Application Visibility and Control perform? (Choose three.) 

A. Validation of malicious traffic 

B. Traffic control 

C. Extending Web Security to all computing devices 

D. Application-level classification 

E. Monitoring 

F. Signature tuning 

Answer: B,D,E 

Q90. Which set of commands changes the FTP client timeout when the sensor is communicating with an FTP server? 

A. sensor# configure terminal 

sensor(config)# service sensor 

sensor(config-hos)# network-settings 

sensor(config-hos-net)# ftp-timeout 500 

B. sensor# configure terminal 

sensor(config)# service host 

sensor(config-hos)# network-settings parameter ftp 

sensor(config-hos-net)# ftp-timeout 500 

C. sensor# configure terminal 

sensor(config)# service host 

sensor(config-hos)# network-settings 

sensor(config-hos-net)# ftp-timeout 500 

D. sensor# configure terminal 

sensor(config)# service network 

sensor(config-hos)# network-settings 

sensor(config-hos-net)# ftp-timeout 500 

Answer: C 

300-207 test

Precise 300-207 courses:

Q91. Which type of signature is generated by copying a default signature and modifying its behavior? 

A. meta 

B. custom 

C. atomic 

D. normalized 

Answer: B 

Q92. Which two conditions must you configure in an event action rule to match all IPv4 addresses in the victim range and filter on the complete subsignature range? (Choose two.) 

A. Disable event action override. 

B. Leave the victim address range unspecified. 

C. Set the subsignature ID-range to the default. 

D. Set the deny action percentage to 100. 

E. Set the deny action percentage to 0. 

Answer: B,C 

Q93. Which two options are features of the Cisco Email Security Appliance? (Choose two.) 

A. Cisco Anti-Replay Services 

B. Cisco Destination Routing 

C. Cisco Registered Envelope Service 

D. Cisco IronPort SenderBase Network 

Answer: C,D 

Q94. Which command allows the administrator to access the Cisco WSA on a secure channel on 

port 8443? 

A. strictssl 

B. adminaccessconfig 

C. ssl 

D. ssh 

Answer: A 

Q95. Cisco’s ASA CX includes which two URL categories? (Choose two.) 

A. Proxy Avoidance 

B. Dropbox 

C. Hate Speech 

D. Facebook 

E. Social Networking 

F. Instant Messaging and Video Messaging 

Answer: C,E 

Q96. What are three benefits of the Cisco AnyConnect Secure Mobility Solution? (Choose three.) 

A. It can protect against command-injection and directory-traversal attacks. 

B. It provides Internet transport while maintaining corporate security policies. 

C. It provides secure remote access to managed computers. 

D. It provides clientless remote access to multiple network-based systems. 

E. It enforces security policies, regardless of the user location. 

F. It uses ACLs to determine best-route connections for clients in a secure environment. 

Answer: B,C,E 

see more Implementing Cisco Threat Control Solutions (SITCS)