[Free] 2018(Aug) Ensurepass Cisco 300-207 Dumps with VCE and PDF 41-50

Ensurepass.com : Ensure you pass the IT Exams
2018 Aug Cisco Official New Released 300-207
100% Free Download! 100% Pass Guaranteed!

Implementing Cisco Threat Control Solutions

Question No: 41

During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by using which command in a policy-map?

  1. cxsc fail

  2. cxsc fail-close

  3. cxsc fail-open

  4. cxssp fail-close

Answer: B

Question No: 42

Cisco’s ASA CX includes which two URL categories? (Choose two.)

  1. Proxy Avoidance

  2. Dropbox

  3. Hate Speech

  4. Facebook

  5. Social Networking

  6. Instant Messaging and Video Messaging

Answer: C,E

Question No: 43

Which two statements about Cisco ESA clusters are true? (Choose two.)

  1. A cluster must contain exactly one group.

  2. A cluster can contain multiple groups.

  3. Clusters are implemented in a client/server relationship.

  4. The cluster configuration must be managed by the cluster administrator.

  5. The cluster configuration can be created and managed through either the GUI or the CLI.

Answer: B,E

Question No: 44

Which two options are known limitations in deploying an IPS sensor in promiscuous mode versus inline mode? (Choose two).

  1. It is less effective in stopping email viruses and automated attackers such as worms.

  2. It requires less of an operational response because the attacks are blocked automatically without operational team support.

  3. Sensors in this deployment cannot stop the trigger packet and are not guaranteed to stop a connection.

  4. A sensor failure affects network functionality.

  5. It does not see the same traffic.

Answer: A,C

Question No: 45

What is a value that Cisco ESA can use for tracing mail flow?

  1. the FQDN of the source IP address

  2. the FQDN of the destination IP address

  3. the destination IP address

  4. the source IP address

Answer: A

Question No: 46

Which command establishes a virtual console session to a CX module within a Cisco Adaptive Security Appliance?

  1. session 1 ip address

  2. session 2 ip address

  3. session 1

  4. session ips console

  5. session cxsc console

Answer: E

Question No: 47

Which two pieces of information are required to implement transparent user identification using context Directory Agent? (Choose two.)

  1. the shared secret

  2. the server name where Context Directory Agent is installed

  3. the server name of the global catalog domaint controller

  4. the syslog server IP address

Answer: A,B

Question No: 48

Which feature does Acceptable Use Controls use to implement Cisco AVC?

  1. ISA

  2. Cisco Web Usage Controls

  3. Cisco WSA

  4. Cisco ESA

Answer: B

Question No: 49

Which four methods are used to deploy transparent mode traffic redirection? (Choose four.)

  1. PAC files

  2. Web Cache Communication Protocol

  3. policy-based routing

  4. Microsoft GPO

  5. Layer 4 switch

  6. DHCP server

  7. Layer 7 switch

  8. manual browser configuration

Answer: B,C,E,G

Question No: 50

In which way are packets handled when the IPS internal zone is set to quot;disabledquot;?

  1. All packets are dropped to the external zone.

  2. All packets are dropped to the internal zone.

  3. All packets are ignored in the internal zone.

  4. All packets are sent to the default external zone.

Answer: D

100% Ensurepass Free Download!
300-207 PDF
100% Ensurepass Free Guaranteed!
300-207 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.