Cisco 300-207 ExamSITCS Implementing Cisco Threat Control Solutions (SITCS)

Total Question: 242 Last Updated: Jun 13,2019
  • Updated 300-207 Dumps
  • Based on Real 300-207 Exams Scenarios
  • Free 300-207 pdf Demo Available
  • Check out our 300-207 Dumps in a new PDF format
  • Instant 300-207 download
  • Guarantee 300-207 success in first attempt
Package Select:

Questions & Answers PDF

Practice Test Software

Practice Test + PDF 30% Discount

Price: $65.95 $29.99

Buy Now Free Trial

What Does 300-207 exams Mean?

We provide real 300-207 exam questions and answers braindumps in two formats. Download PDF & Practice Tests. Pass Cisco 300-207 Exam quickly & easily. The 300-207 PDF type is available for reading and printing. You can print more and practice many times. With the help of our Cisco 300-207 dumps pdf and vce product and material, you can easily pass the 300-207 exam.

Q1. The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs). 

The simulator will provide access to the graphical user interfaces of one Cisco ASA and one Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are implemented in the simulator. The options that have been implemented are sufficient to determine the best answer to each of the questions that are presented. 

Your task is to examine the details available in the simulated graphical user interfaces and select the best answer. 

Between the Cisco ASA configuration and the Cisco WSA configuration, what is true with respect to redirected ports? 

A. Both are configured for port 80 only. 

B. Both are configured for port 443 only. 

C. Both are configured for both port 80 and 443. 

D. Both are configured for ports 80, 443 and 3128. 

E. There is a configuration mismatch on redirected ports. 

Answer:

Explanation: This can be seen from the WSA Network tab shown below: 

\\\\psf\\Home\\Desktop\\Screen Shot 2015-01-27 at 9.42.49 AM.png 


Q2. Which three zones are used for anomaly detection? (Choose three.) 

A. Internal zone 

B. External zone 

C. Illegal zone 

D. Inside zone 

E. Outside zone 

F. DMZ zone 

Answer: A,B,C 


Q3. Which command establishes a virtual console session to a CX module within a Cisco Adaptive Security Appliance? 

A. session 1 ip address 

B. session 2 ip address 

C. session 1 

D. session ips console 

E. session cxsc console 

Answer:


Q4. Which two statements about Cisco ESA clusters are true? (Choose two.) 

A. A cluster must contain exactly one group. 

B. A cluster can contain multiple groups. 

C. Clusters are implemented in a client/server relationship. 

D. The cluster configuration must be managed by the cluster administrator. 

E. The cluster configuration can be created and managed through either the GUI or the CLI. 

Answer: B,E 


Q5. Which four statements are correct regarding management access to a Cisco Intrusion Prevention System? (Choose four.) 

A. The Telnet protocol is enabled by default 

B. The Telnet protocol is disabled by default 

C. HTTP is enabled by default 

D. HTTP is disabled by default 

E. SSH is enabled by default 

F. SSH is disabled by default 

G. HTTPS is enabled by default 

H. HTTPS is disabled by default 

Answer: B,D,E,G 


Q6. Which command can change the HTTPS SSL method on the Cisco ESA? 

A. sslconfig 

B. strictssl 

C. sshconfig 

D. adminaccessconfig 

Answer:


Q7. Which Cisco IPS deployment mode is best suited for bridged interfaces? 

A. inline interface pair mode 

B. inline VLAN pair mode 

C. inline VLAN group mode 

D. inline pair mode 

Answer:


Q8. The helpdesk was asked to provide a record of delivery for an important email message that a customer claims it did not receive. Which feature of the Cisco Email Security Appliance provides this record? 

A. Outgoing Mail Reports 

B. SMTP Routes 

C. Message Tracking 

D. Scheduled Reports 

E. System Administration 

Answer:


Q9. Which two statements about Signature 1104 are true? (Choose two.) 

A. This is a custom signature. 

B. The severity level is High. 

C. This signature has triggered as indicated by the red severity icon. 

D. Produce Alert is the only action defined. 

E. This signature is enabled, but inactive, as indicated bythe/0 to that follows the signature number. 

Answer: B,D 

Explanation: 

This can be seen here where signature 1004 is the 5th one down: 


Q10. In order to set up HTTPS decryption on the Cisco Web Security Appliance, which two steps must be performed? (Choose two.) 

A. Enable and accept the EULA under Security Services > HTTPS Proxy. 

B. Upload a publicly signed server certificate. 

C. Configure or upload a certificate authority certificate. 

D. Enable HTTPS decryption in Web Security Manager > Access Policies. 

Answer: A,C 


Related 300-207 Articles