[New-300-210-Dumps]300-210 Exam Questions PDF Free Download in Braindump2go[26-35]
2017 Jan New Cisco 300-210 PDF and VCE Dumps 80q 300-210 Exam Questions RELEASED Today!
1.|New 300-210 PDF and 300-210 VCE Dumps 80Q&As Download:
2.|New 300-210 Exam Questions & Answers Download:
What is a value that Cisco ESA can use for tracing mail flow?
A. the source IP address
B. the FQDN of the destination IP address
C. the destination IP address
D. the FQDN of the source IP address
Which option is a benefit of Cisco Email Security virtual appliance over the Cisco ESA appliance?
A. global threat intelligence updates from Talos
B. reduced space and power requirements
C. outbound message protection
D. automated administration
Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.)
A. If it is between -1 and +10, the email is accepted
B. If it is between +1 and +10, the email is accepted
C. If it is between -3 and -1, the email is accepted and additional emails from the sender are throttled
D. If it is between -3 and +1, the email is accepted and additional emails from the sender are throttled
E. If it is between -4 and +1, the email is accepted and additional emails from the sender are throttled
F. If it is between -10 and -3, the email is blocked
G. If it is between -10 and -3, the email is sent to the virus and spam engines for additional scanning
H. If it is between -10 and -4, the email is blocked
What is the function of the Web Proxy Auto Discovery protocol?
A. It enables a web client’s traffic flows to be redirected in real time.
B. It enables web clients to dynamically resolve hostname records.
C. It enables a web client to download a script or configuration file that is named by a URL.
D. It enables a web client to discover the URL of a configuration file.
On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?
A. health policy
B. system policy
C. correlation policy
D. access control policy
E. health awareness policy
Your organization has subscribed to the Cisco Cloud Web Security (CWS) service.
You have been assigned the task of configuring the CWS connector on the ISR-G2 router at a branch office. Details of the configuration requirements include:
– Content scanning should be enabled for traffic outbound from FastEthernet0/1.
– Explicitly specify 8080 for both the http and the https ports.
– The primary CWS proxy server is proxy-a.scansafe.net.
– The secondary CWS proxy server is proxy-b.scansafe.net .
– The unencrypted license key is 0123456789abcdef
– If the CWS proxy servers are not available. web traffic from the branch office should be denied . – After configuration. use show commands to verify connectivity with the CWS service and scan activity
You can access the console of the ISR at the branch office using the icon on the topology display. The enable password is Cisco!23
With Firepower Threat Defense, which two interface settings are required when configuring a routed interface? (Choose two.)
C. Media Type
D. Redundant Interface
Which Cisco AMP for Endpoints, what, is meant by simple custom detection?
A. It is a rule for identifying a file that should be whitelisted by Cisco AMP.
B. It is a method for identifying and quarantining a specific file by its SHA-256 hash.
C. It is a feature for configuring a personal firewall.
D. It is a method for identifying and quarantining a set of files by regular expression language.
Which feature of the Cisco Hybrid Email Security services enables you to create multiple email senders on a single Cisco ESA?
A. Email Marketing Connector
B. Virtual Routing and Forwarding
C. Virtual Gateway
D. Mail Flow Policy Connector
E. Sender Groups
Which option lists the minimum requirements to deploy a managed device inline?
A. passive interface, security zone, MTU, and link mode.
B. passive interface, MTU, MDI/MDIX, and link mode.
C. inline interfaces, MTU, MDI/MDIX, and link mode.
D. inline interfaces, security zones, MTU, and link mode.
Which two methods are used to deploy transparent mode traffic redirection? (Choose two)
A. Microsoft GPO
B. policy-based routing
C. DHCP server
D. PAC files
E. Web Cache Communication Protocol