300-207 SITCS Implementing Cisco Threat Control Solutions

Exam Number 300-207 SITCS
Associated Certifications CCNP Security
Duration 90 minutes (65 – 75 questions)
Available Languages English, Japanese

Exam Description
The Implementing Cisco Threat Control Solutions (SITCS) (300-207) exam tests a network security engineer on advanced firewall architecture and configuration with the Cisco next-generation firewall, utilizing access and identity policies. This 90-minute exam consists of 65–75 questions and covers integration of Intrusion Prevention System (IPS) and context-aware firewall components, as well as Web (Cloud) and Email Security solutions. Candidates can prepare for this exam by taking the Implementing Cisco Threat Control Solutions (SITCS) course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Content Security 22%

1.1 Cisco ASA 5500-X NGFW Security Services

1.1.a Describe features and functionality
1.1.b Implement web usage control (URL-filtering, reputation based, file filtering)
1.1.c Implement AVC
1.1.d Implement decryption policies
1.1.e Describe traffic redirection and capture methods

1.2 Cisco Cloud Web Security

1.2.a Describe features and functionality
1.2.b Implement IOS and ASA connectors
1.2.c Implement AnyConnect web security module
1.2.d Describe web usage control
1.2.e Implement AVC
1.2.f Implement anti-malware
1.2.g Describe decryption policies

1.3 Cisco WSA

1.3.a Describe features and functionality
1.3.b Implement data security
1.3.c Implement WSA Identity and Authentication, including Transparent User Identification
1.3.d Describe web usage control
1.3.e Implement AVC
1.3.f Implement anti-malware
1.3.g Describe decryption policies
1.3.h Describe traffic redirection and capture methods (Explicit Proxy vs. Transparent Proxy)

1.4 Cisco ESA

1.4.a Describe features and functionality
1.4.b Implement email encryption
1.4.c Implement anti-spam policies
1.4.d Implement virus outbreak filter
1.4.e Implement DLP policies
1.4.f Implement anti-malware
1.4.g Implement inbound and outbound mail policies and authentication
1.4.h Describe traffic redirection and capture methods

2.0 Threat Defense 23%

2.1 Network IPS

2.1.a Implement traffic redirection and capture methods
2.1.b Implement network IPS deployment modes
2.1.c Describe signatures engines
2.1.d Implement event actions & overrides/filters
2.1.e Implement anomaly detection
2.1.f Implement risk ratings
2.1.g Describe IOS IPS

2.2 Configure device hardening per best practices

2.2.a IPS
2.2.b Content Security appliances

3.0 Devices GUIs and Secured CLI 16%

3.1 Content Security

3.1.a Implement HTTPS and SSH access
3.1.b Describe configuration elements
3.1.c Implement ESA GUI for message tracking

4.0 Troubleshooting, Monitoring and Reporting Tools 19%

4.1 Configure IME and IP logging for IPS

4.2 Content Security

4.2.a Describe reporting functionality
4.2.b Implement the WSA Policy Trace tool
4.2.c Implement the ESA Message Tracking tool
4.2.d Implement the ESA Trace tool
4.2.e Use web interface to verify traffic is being redirected to CWS
4.2.f Use CLI on IOS to verify CWS operations
4.2.g Use CLI on ASA to verify CWS operations
4.2.h Use the PRSM Event Viewer to verify ASA NGFW operations
4.2.i Describe the PRSM Dashboards and Reports

4.3 Monitor Cisco Security IntelliShield

4.3.a Describe at a high level the features of the Cisco Security IntelliShield Alert Manager Service

5.0 Threat Defense Architectures 8%

5.1 Design IPS solution

5.1.a Deploy Inline or Promiscuous
5.1.b Deploy as IPS appliance, IPS software or hardware module or IOS IPS
5.1.c Describe methods of IPS appliance load-balancing
5.1.d Describe the need for Traffic Symmetry
5.1.e Inline modes comparison – inline interface pair, inline VLAN pair, and inline VLAN group
5.1.f Management options

6.0 Content Security Architectures 12%

6.1 Design Web Security solution

6.1.a Compare ASA NGFW vs. WSA vs. CWS
6.1.b Compare Physical WSA vs. Virtual WSA
6.1.c List available CWS connectors

6.2 Design Email Security solution

6.2.a Compare Physical ESA vs. Virtual ESA
6.2.b Describe Hybrid mode

6.3 Design Application Security solution

6.3.a Describe the need for application visibility and control

During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP
fails by using which command in a policy-map?

A. cxsc fail
B. cxsc fail-close
C. cxsc fail-open
D. cxssp fail-close

Answer: B


A network engineer may use which three types of certificates when implementing HTTPS
decryption services on the ASA CX? (Choose three.)

A. Self Signed Server Certificate
B. Self Signed Root Certificate
C. Microsoft CA Server Certificate
D. Microsoft CA Subordinate Root Certificate
E. LDAP CA Server Certificate
F. LDAP CA Root Certificate
G. Public Certificate Authority Server Certificate
H. Public Certificate Authority Root Certificate

Answer: B,D,F


Cisco’s ASA CX includes which two URL categories? (Choose two.)

A. Proxy Avoidance
B. Dropbox
C. Hate Speech
D. Facebook
E. Social Networking
F. Instant Messaging and Video Messaging

Answer: C,E


A Cisco Web Security Appliance’s policy can provide visibility and control of which two elements?
(Choose two.)

A. Voice and Video Applications
B. Websites with a reputation between -100 and -60
C. Secure websites with certificates signed under an unknown CA
D. High bandwidth websites during business hours

Answer: C,D


Which Cisco Web Security Appliance design requires minimal change to endpoint devices?

A. Transparent Mode
B. Explicit Forward Mode
C. Promiscuous Mode
D. Inline Mode

Answer: A



Click here to view complete Q&A of 300-207 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Cisco 300-207 Certification, Cisco 300-207 Training at certkingdom.com