Act now and download your Cisco 300-207 test today! Do not waste time for the worthless Cisco 300-207 tutorials. Download Most recent Cisco Implementing Cisco Threat Control Solutions (SITCS) exam with real questions and answers and begin to learn Cisco 300-207 with a classic professional.

Q91. The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs). 

The simulator will provide access to the graphical user interfaces of one Cisco ASA and one Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are implemented in the simulator. The options that have been implemented are sufficient to determine the best answer to each of the questions that are presented. 

Your task is to examine the details available in the simulated graphical user interfaces and select the best answer. 

What traffic is not redirected by WCCP? 

A. Traffic destined to public address space 

B. Traffic sent from public address space 

C. Traffic destined to private address space 

D. Traffic sent from private address space 

Answer:

Explanation: From the screen shot below we see the WCCP-Redirection ACL is applied, so all traffic from the Private IP space to any destination will be redirected. 

\psfHomeDesktopScreen Shot 2015-01-27 at 9.38.36 AM.png 


Q92. How does a user access a Cisco Web Security Appliance for initial setup? 

A. Connect the console cable and use the terminal at 9600 baud to run the setup wizard. 

B. Connect the console cable and use the terminal at 115200 baud to run the setup wizard. 

C. Open the web browser at 192.168.42.42:8443 for the setup wizard over https. 

D. Open the web browser at 192.168.42.42:443 for the setup wizard over https. 

Answer:


Q93. Which configuration option causes an ASA with IPS module to drop traffic matching IPS signatures and to block all traffic if the module fails? 

A. Inline Mode, Permit Traffic 

B. Inline Mode, Close Traffic 

C. Promiscuous Mode, Permit Traffic 

D. Promiscuous Mode, Close Traffic 

Answer:


Q94. When you deploy a sensor to send connection termination requests, which additional traffic-monitoring function can you configure the sensor to perform? 

A. Monitor traffic as it flows to the sensor. 

B. Monitor traffic as it flows through the sensor. 

C. Monitor traffic from the Internet only. 

D. Monitor traffic from both the Internet and the intranet. 

Answer:


Q95. Which three sender reputation ranges identify the default behavior of the Cisco Email Security Appliance? (Choose three.) 

A. If it is between -1 and +10, the email is accepted 

B. If it is between +1 and +10, the email is accepted 

C. If it is between -3 and -1, the email is accepted and additional emails from the sender are throttled 

D. If it is between -3 and +1, the email is accepted and additional emails from the sender are throttled 

E. If it is between -4 and +1, the email is accepted and additional emails from the sender are throttled 

F. If it is between -10 and -3, the email is blocked 

G. If it is between -10 and -3, the email is sent to the virus and spam engines for additional scanning 

H. If it is between -10 and -4, the email is blocked 

Answer: A,C,F 


Q96. Joe was asked to secure access to the Cisco Web Security Appliance to prevent unauthorized access. Which four steps should Joe implement to accomplish this goal? (Choose four.) 

A. Implement IP access lists to limit access to the management IP address in the Cisco Web Security Appliance GUI. 

B. Add the Cisco Web Security Appliance IP address to the local access list. 

C. Enable HTTPS access via the GUI/CLI with redirection from HTTP. 

D. Replace the Cisco self-signed certificate with a publicly signed certificate. 

E. Put the Cisco WSA Management interface on a private management VLAN. 

F. Change the netmask on the Cisco WSA Management interface to a 32-bit mask. 

G. Create an MX record for the Cisco Web Security Appliance in DNS. 

Answer: A,C,D,E