[Free] 2017(Nov) Dumps4cert Testinsides Cisco 300-207 Dumps with VCE and PDF Download 41-50

Dumps4cert 2017 Nov Cisco Official New Released 300-207
100% Free Download! 100% Pass Guaranteed!
http://www.Dumps4cert.com/300-207.html

Implementing Cisco Threat Control Solutions

Question No: 41

During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by using which command in a policy-map?

  1. cxsc fail

  2. cxsc fail-close

  3. cxsc fail-open

  4. cxssp fail-close

Answer: B

Question No: 42

Cisco’s ASA CX includes which two URL categories? (Choose two.)

  1. Proxy Avoidance

  2. Dropbox

  3. Hate Speech

  4. Facebook

  5. Social Networking

  6. Instant Messaging and Video Messaging

Answer: C,E

Question No: 43

Which two statements about Cisco ESA clusters are true? (Choose two.)

  1. A cluster must contain exactly one group.

  2. A cluster can contain multiple groups.

  3. Clusters are implemented in a client/server relationship.

  4. The cluster configuration must be managed by the cluster administrator.

  5. The cluster configuration can be created and managed through either the GUI or the CLI.

Answer: B,E

Question No: 44

Which two options are known limitations in deploying an IPS sensor in promiscuous mode versus inline mode? (Choose two).

  1. It is less effective in stopping email viruses and automated attackers such as worms.

  2. It requires less of an operational response because the attacks are blocked automatically without operational team support.

  3. Sensors in this deployment cannot stop the trigger packet and are not guaranteed to stop a connection.

  4. A sensor failure affects network functionality.

  5. It does not see the same traffic.

Answer: A,C

Question No: 45

What is a value that Cisco ESA can use for tracing mail flow?

  1. the FQDN of the source IP address

  2. the FQDN of the destination IP address

  3. the destination IP address

  4. the source IP address

Answer: A

Question No: 46

Which command establishes a virtual console session to a CX module within a Cisco Adaptive Security Appliance?

  1. session 1 ip address

  2. session 2 ip address

  3. session 1

  4. session ips console

  5. session cxsc console

Answer: E

Question No: 47

Which two pieces of information are required to implement transparent user identification using context Directory Agent? (Choose two.)

  1. the shared secret

  2. the server name where Context Directory Agent is installed

  3. the server name of the global catalog domaint controller

  4. the syslog server IP address

Answer: A,B

Question No: 48

Which feature does Acceptable Use Controls use to implement Cisco AVC?

  1. ISA

  2. Cisco Web Usage Controls

  3. Cisco WSA

  4. Cisco ESA

Answer: B

Question No: 49

Which four methods are used to deploy transparent mode traffic redirection? (Choose four.)

  1. PAC files

  2. Web Cache Communication Protocol

  3. policy-based routing

  4. Microsoft GPO

  5. Layer 4 switch

  6. DHCP server

  7. Layer 7 switch

  8. manual browser configuration

Answer: B,C,E,G

Question No: 50

In which way are packets handled when the IPS internal zone is set to quot;disabledquot;?

  1. All packets are dropped to the external zone.

  2. All packets are dropped to the internal zone.

  3. All packets are ignored in the internal zone.

  4. All packets are sent to the default external zone.

Answer: D

100% Free Download!
Download Free Demo:300-207 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert 300-207 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE