Your success in Cisco 300-207 is our sole target and we develop all our 300-207 braindumps in a way that facilitates the attainment of this target. Not only is our 300-207 study material the best you can find, it is also the most detailed and the most updated. 300-207 Practice Exams for Cisco CCNP Security 300-207 are written to the highest standards of technical accuracy.

Q41. Which Cisco technology prevents targeted malware attacks, provides data loss prevention and spam protection, and encrypts email? 


B. secure mobile access 

C. IPv6 DMZ web service 



Q42. With Cisco IDM, which rate limit option specifies the maximum bandwidth for rate-limited traffic? 

A. protocol 

B. rate 

C. bandwidth 

D. limit 


Q43. What are two features of the Cisco ASA NGFW? (Choose two.) 

A. It can restrict access based on qualitative analysis. 

B. It can restrict access based on reputation. 

C. It can reactively protect against Internet threats. 

D. It can proactively protect against Internet threats. 

Answer: B,D 

Q44. Cisco AVC allows control of which three of the following? (Choose three.) 

A. Facebook 


C. IPv6 

D. MySpace 

E. Twitter 


Answer: A,D,E 

Q45. Which Cisco monitoring solution displays information and important statistics for the security devices in a network? 

A. Cisco Prime LAN Management 

B. Cisco ASDM Version 5.2 

C. Cisco Threat Defense Solution 

D. Syslog Server 



Q46. Which role does Passive Identity Management play in the Cisco Cloud Web Security architecture? 

A. It provides user-level information that is received from Active Directory. 

B. It enables the administrator to control web access for users and user groups. 

C. It defines a standard for exchanging authentication and authorization data. 

D. It controls content that passes into and out of the network. 


Q47. A system administrator wants to know if the email traffic from a remote partner will activate special treatment message filters that are created just for them. Which tool on the Cisco Email Security gateway can you use to debug or emulate the flow that a message takes through the work queue? 

A. the message tracker interface 

B. centralized or local message tracking 

C. the CLI.findevent command 

D. the trace tool 

E. the CLI.grep command 


Q48. Which two Cisco IPS events will generate an IP log? (Choose two.) 

A. A signature had an event action that was configured with log packets. 

B. A statically configured IP or IP network criterion was matched. 

C. A dynamically configured IP address or IP network was matched. 

D. An attack produced a response action. 

Answer: A,B 

Q49. Refer to the exhibit. 

When designing the network to redirect web traffic utilizing the Catalyst 6500 to the Cisco Web Security Appliance, impact on the switch platform needs consideration. Which four rows identify the switch behavior in correlation to the redirect method? (Choose four.) 

A. Row 1 

B. Row 2 

C. Row 3 

D. Row 4 

E. Row 5 

F. Row 6 

G. Row 7 

H. Row 8 

Answer: B,C,F,G 

Q50. Which command is used to enable strong ciphers on the Cisco Web Security Appliance? 

A. interfaceconfig 

B. strictssl 

C. etherconfig 

D. adminaccessconfig