Master the 300-207 Implementing Cisco Threat Control Solutions (SITCS) content and be ready for exam day success quickly with this Exambible 300-207 exam. We guarantee it!We make it a reality and give you real 300-207 questions in our Cisco 300-207 braindumps.Latest 100% VALID Cisco 300-207 Exam Questions Dumps at below page. You can use our Cisco 300-207 braindumps and pass your exam.

Q1. An ASA with an IPS module must be configured to drop traffic matching IPS signatures and block all traffic if the module fails. Which describes the correct configuration? 

A. Inline Mode, Permit Traffic 

B. Inline Mode, Close Traffic 

C. Promiscuous Mode, Permit Traffic 

D. Promiscuous Mode, Close Traffic 

Answer:


Q2. What are three best practices for a Cisco Intrusion Prevention System? (Choose three.) 

A. Checking for new signatures every 4 hours 

B. Checking for new signatures on a staggered schedule 

C. Automatically updating signature packs 

D. Manually updating signature packs 

E. Group tuning of signatures 

F. Single tuning of signatures 

Answer: B,C,E 


Q3. Which two statements about Cisco ESA clusters are true? (Choose two.) 

A. A cluster must contain exactly one group. 

B. A cluster can contain multiple groups. 

C. Clusters are implemented in a client/server relationship. 

D. The cluster configuration must be managed by the cluster administrator. 

E. The cluster configuration can be created and managed through either the GUI or the CLI. 

Answer: B,E 


Q4. Which Cisco Cloud Web Security tool provides URL categorization? 

A. Cisco Dynamic Content Analysis Engine 

B. Cisco ScanSafe 

C. ASA Firewall Proxy 

D. Cisco Web Usage Control 

Answer:


Q5. The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs). 

The simulator will provide access to the graphical user interfaces of one Cisco ASA and one Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are implemented in the simulator. The options that have been implemented are sufficient to determine the best answer to each of the questions that are presented. 

Your task is to examine the details available in the simulated graphical user interfaces and select the best answer. 

Which of the following is true with respect to the version of WCCP configured on the Cisco ASA and the Cisco WSA? 

A. Both are configured for WCCP v1. 

B. Both are configured for WCCP v2. 

C. Both are configured for WCCP v3. 

D. There is a WCCP version mismatch between the Cisco WSA and the Cisco ASA. 

Answer:

Explanation: 

ASA version shows as version 2.0: 

\psfHomeDesktopScreen Shot 2015-01-27 at 9.45.57 AM.png 

WSA also shows version 2 is being used: 

\psfHome.TrashScreen Shot 2015-01-27 at 9.47.53 AM.png 


Q6. Refer to the exhibit. 

What CLI command generated the output? 

A. smtproutes 

B. tophosts 

C. hoststatus 

D. workqueuestatus 

Answer:


Q7. Which is the default IP address and admin port setting for https in the Cisco Web Security Appliance? 

A. http://192.168.42.42:8080 

B. http://192.168.42.42:80 

C. https://192.168.42.42:443 

D. https://192.168.42.42:8443 

Answer:


Q8. What is the authentication method for an encryption envelope that is set to medium security? 

A. The recipient must always enter a password, even if credentials are cached. 

B. A password is required, but cached credentials are permitted. 

C. The recipient must acknowledge the sensitivity of the message before it opens. 

D. The recipient can open the message without authentication. 

Answer:


Q9. Which three options are valid event actions for a Cisco IPS? (Choose three.) 

A. deny-packet-inline 

B. deny-attack-reset 

C. produce-verbose-alert 

D. log-attacker-packets 

E. deny-packet-internal 

F. request-block-drop-connection 

Answer: A,C,D 


Q10. Cisco’s ASA CX includes which two URL categories? (Choose two.) 

A. Proxy Avoidance 

B. Dropbox 

C. Hate Speech 

D. Facebook 

E. Social Networking 

F. Instant Messaging and Video Messaging 

Answer: C,E