Proper study guides for Improve Cisco Implementing Cisco Threat Control Solutions (SITCS) certified begins with Cisco 300-207 preparation products which designed to deliver the Breathing 300-207 questions by making you pass the 300-207 test at your first time. Try the free 300-207 demo right now.

2021 Dec 300-207 sitcs book:

Q31. Which command sets the number of packets to log on a Cisco IPS sensor? 

A. ip-log-count number 

B. ip-log-packets number 

C. ip-log-bytes number 

D. ip-log number 


Q32. What step is required to enable HTTPS Proxy on the Cisco Web Security Appliance? 

A. Web Security Manager HTTPS Proxy click Enable 

B. Security Services HTTPS Proxy click Enable 

C. HTTPS Proxy is enabled by default 

D. System Administration HTTPS Proxy click Enable 


Q33. Which five system management protocols are supported by the Cisco Intrusion Prevention System? (Choose five.) 

A. SNMPv2c 

B. SNMPv1 

C. SNMPv2 

D. SNMPv3 

E. Syslog 



Answer: A,B,C,F,G 

Q34. When a Cisco IPS is deployed in fail-closed mode, what are two conditions that can result in traffic being dropped? (Choose two.) 

A. The signature engine is undergoing the build process. 

B. The SDF failed to load. 

C. The built-in signatures are unavailable. 

D. An ACL is configured. 

Answer: A,B 

Q35. Which three administrator actions are used to configure IP logging in Cisco IME? (Choose three.) 

A. Select a virtual sensor. 

B. Enable IP logging. 

C. Specify the host IP address. 

D. Set the logging duration. 

E. Set the number of packets to capture. 

F. Set the number of bytes to capture. 

Answer: A,C,D 

Regenerate cbt 300-207:

Q36. Which three options are characteristics of router-based IPS? (Choose three.) 

A. It is used for large networks. 

B. It is used for small networks. 

C. It supports virtual sensors. 

D. It supports multiple VRFs. 

E. It uses configurable anomaly detection. 

F. Signature definition files have been deprecated. 

Answer: B,D,F 

Q37. What can Cisco Prime Security Manager (PRSM) be used to achieve? 

A. Configure and Monitor Cisco CX Application Visibility and Control, web filtering, access and decryption policies 

B. Configure Cisco ASA connection limits 

C. Configure TCP state bypass in Cisco ASA and IOS 

D. Configure Cisco IPS signature and monitor signature alerts 

E. Cisco Cloud Security on Cisco ASA 


Q38. Which Cisco technology is a modular security service that combines a stateful inspection firewall with next-generation application awareness, providing near real-time threat protection? 

A. Cisco ASA 5500 series appliances 

B. Cisco ASA CX Context-Aware Security 


D. Internet Edge Firewall / IPS 


Q39. What is the CLI command to create a new Message Filter in a Cisco Email Security Appliance? 

A. filterconfig 

B. filters new 

C. messagefilters 

D. policyconfig-- inbound or outbound-- filters 


Q40. Which two Cisco IPS events will generate an IP log? (Choose two.) 

A. A signature had an event action that was configured with log packets. 

B. A statically configured IP or IP network criterion was matched. 

C. A dynamically configured IP address or IP network was matched. 

D. An attack produced a response action. 

Answer: A,B