300-820 Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
Getting ready for the 300-820 certification? Our 300-820 Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day
Effective 300-820 exam prep free is the key to success. With our free practice questions, you can:
- Get familiar with exam format and question style
- Identify which topics you’ve mastered—and which need more review
- Boost your confidence and reduce exam anxiety
Below, you will find 50 realistic 300-820 Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.
An engineer is deploying Mobile and Remote Access to allow external Cisco Jabber users to sign into a Cisco UCM cluster via Cisco Expressways. The users will sign-in in the format username@cisco.com . Contact photos for Jabber are hosted on a webserver with the FQDN of phonebook cisco.com. Which configuration must be completed to allow external Jabber users to see contact photos?
A. An HTTP allow list entry must be made on the Expressway-E for phonebook cisco.com.
B. A SIP allow list entry must be made on the Expressway-E for .*@cisco.com.
C. An HTTP allow list entry must be made on the Expressway-C for phonebook cisco.com.
D. A SIP allow list entry must be made on the Expressway-C for .*@cisco.com.
Refer to the exhibit showing logs from the Expressway-C, a copy of the Expressway-E certificate, and the UC traversal zone configuration for the Expressway-C. An office administrator is deploying mobile and remote access and sees an issue with the UC traversal zone. The zone is showing `TLS negotiation failure`. What is causing this issue?
A. The Expressway-E certificate includes the Expressway-C FQDN as a SAN entry
B. The Expressway-C is missing the FQDN of Cisco UCM in the Common Name of its certificate
C. In the UC Traversal Zone on the Expressway-C, the peer address is set to the IP of the Expressway-E, which is not a SAN entry in the Expressway-E certificate
D. The Expressway-E does not have the FQDN of Cisco UCM listed as a SAN in its certificate
For a Mobile and Remote Access deployment, which server's certificate must include the Unified registration domain as a Subject Alternate Name?
A. Expressway-C server certificate
B. Cisco Unified Communications Manager server certificate
C. Expressway-E server certificate
D. Expressway-C and Expressway-E server certificate
Which two certificate authority lists are available in Cisco ESA? (Choose two.)
A. default
B. system
C. user
D. custom
E. demo
Which components are required when encrypting SMTP with TLS on Cisco ESA when the sender requires TLS verification?
A. self-signed certificate in PKCS#7 format
B. X.509 certificate and matching private key from a CA
C. self-signed certificate in PKCS#12 format
D. DER certificate and matching public key from a CA
A Cisco ESA is configured such that emails with a reputation score above -6 are logged and those with a score below -6 are logged, encrypted, and then delivered. An email body contains a shortened URL that exceeds the nested shortened URLs limit. Which action is taken against the email?
A. It is encrypted but not logged.
B. It is logged but not encrypted.
C. It is logged and dropped.
D. It is logged and encrypted.
A list of company executives is routinely being spoofed, which puts the company at risk of malicious email attacks. An administrator must ensure that executive messages are originating from legitimate sending addresses. Which two steps must be taken to accomplish this task? (Choose two.)
A. Create an incoming content filter with SPF detection.
B. Create a content dictionary including a list of the names that are being spoofed.
C. Enable the Forged Email Detection feature under Security Settings.
D. Enable DMARC feature under Mail Policies.
E. Create an incoming content filter with the Forged Email Detection condition.
Which SIP media encryption mode is applied by default for newly created zones in the Cisco Expressway?
A. Off
B. Best Effort
C. Auto
D. Force Encrypted
How does the graymail safe unsubscribe feature function?
A. It strips the malicious content of the URI before unsubscribing.
B. It checks the URI reputation and category and allows the content filter to take an action on it.
C. It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.
D. It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.
Which suboption must be selected when LDAP is configured for Spam Quarantine End-User Authentication?
A. Designate as the active query
B. Update Frequency
C. Server Priority
D. Entity ID
Refer to the exhibit. What results from this filter configuration?
A. Action is skipping all antispam checks for the mail.
B. Action is applied to all mail from test@cisco.com.
C. Action is skipping all antivirus checks for the mail.
D. Action is applied to all mail that has the subject “FW: Bounce Notification.”
A company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data. Users must be able to flag the messages that require encryption versus a Cisco ESA scanning all messages and automatically encrypting via detection. Which action enables this capability?
A. Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting.
B. Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.
C. Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy.
D. Create an encryption profile and an outgoing content filter that includes [SECURE] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action.
An external Jabber device cannot register. While troubleshooting this issue, the engineer discovers that privately signed certificates are being used on Expressway-C and Expressway-E. What action will resolve this issue?
A. The private CA certificate must be placed in the phone trust store
B. The Jabber client must register to the Cisco UCM internally before it will register externally
C. The device running the Jabber client must download and trust the private CA certificate
D. The device running the Jabber client must use a VPN to register
What is a benefit of enabling external SPAM quarantine on Cisco SMA?
A. It provides access to the SPAM quarantine interface on which a user can release, duplicate, or delete.
B. It provides the ability to scan messages by using two engines to increase a catch rate.
C. It provides the ability to consolidate SPAM quarantine data from multiple Cisco ESAs to one central console.
D. It provides the ability to back up SPAM quarantine from multiple Cisco ESAs to one central console.
Which service is available in a cloud-based deployment using Cisco Webex Messenger?
A. Presence
B. Phone services
C. Voicemail
D. Call forward services
When the network requirements are configured for a new Video Mesh deployment, which firewall ports are required so that Video Mesh cascade signaling succeeds?
A. TCP 443 and 444
B. TCP 443 and 8443
C. UDP 5004 and 5005
D. UDP 33432 through 33433
Refer to the exhibit. How should this configuration be modified to stop delivering Zero Day malware attacks?
A. Change Unscannable Action from Deliver As Is to Quarantine.
B. Change File Analysis Pending action from Deliver As Is to Quarantine.
C. Configure mailbox auto-remediation.
D. Apply Prepend on Modify Message Subject under Malware Attachments.
Which restriction is in place for end users accessing the spam quarantine on Cisco ESA devices?
A. The end user must be assigned to the Guest role.
B. Access via a link in a notification in mandatory.
C. Authentication is required when accessing via a link in a notification.
D. Direct access via web browser requires authentication.
When external video endpoints are called via a DNS zone, which dialing method requires DNS to be configured in the Expressway server?
A. IP dialing
B. URI dialing
C. DN dialing
D. E.164
Which two types of information does Cisco Expressway back up? (Choose two.)
A. call records
B. log files
C. IP addresses
D. current call states
E. security certificates
What is the purpose of Cisco Email Encryption on Cisco ESA?
A. to ensure anonymity between a recipient and MTA
B. to ensure integrity between a sender and MTA
C. to authenticate direct communication between a sender and Cisco ESA
D. to ensure privacy between Cisco ESA and MTA
A call is sent by Cisco UCM to Expressway with a URI of 75080001@expc1a.pod8.test.lab . If (7508`¦)@expc1a.pod8.test.lab.* is the pattern string, what would be the replacement string of the transform in Expressway to re-write the call so that it becomes 75080001@conf.pod8.test.lab ?
A. 1@conf.pod8.test.lab.@
B. 1@conf.pod8.testlab.*
C. 1@conf.pod8.test.lab
D. 1@conf.pod8.test.lab.!
Refer to the exhibit. The administrator attempted to log in, but Jabber clients cannot log in via mobile and remote access. How is this issue resolved?
A. Skype for Business mode must be disabled on the DNS server because it conflicts with Jabber login requirements.
B. The domain pod1.local must be deprovisioned from the Webex cloud for Jabber logins.
C. A DNS SRV record must be created for _collab-edge._tls.pod1.local that points to the Expressway-E.
D. The username jabberuser@pod1.local is invalid. The user should instead sign-in simply as jabberuser.
Which two statements about Cisco Webex Video Mesh Nodes are true? (Choose two.)
A. When Expressway Core works with VMN clusters, Expressway Core decides which VMN is used for signaling/media connection.
B. Cloud-registered devices choose a VMN cluster based on the lowest STUN round trip delay.
C. The cascading traffic between VMN must bypass the firewall.
D. When Cisco Unified Communications Manager works with multiple VMNs, Cisco Unified CM decides which VMN is used for signaling connection.
E. A VMN can terminate a media connection while operating in maintenance mode.
An organization wants to use DMARC to improve its brand reputation by leveraging DNS records. Which two email authentication mechanisms are utilized during this process? (Choose two.)
A. SPF
B. DSTP
C. DKIM
D. TLS
E. PKI
Which type of interface is required when the Cisco Expressway-E is located in a DMZ between two separate firewalls on separate network segments?
A. dual network interface
B. application programming interface
C. command line interface
D. single network interface
A Cisco ESA administrator is creating a Mail Flow Policy to receive outbound email from Microsoft Exchange. Which Connection Behavior must be selected to properly process the messages?
A. Delay
B. Accept
C. Relay
D. Reject
Refer to the exhibit. An administrator troubleshoots Cisco Jabber users experiencing issues when trying to log in and notices errors in the Jabber problem report log. The administrator also sees that the Intercluster Sync Agent service is not running on the IMM and Presence server. Why is the Jabber client unable to sign in?
A. The XmppSDK.dl file is missing from the IM and Presence server
B. The XMPP stanza is not using the correct ID for the Jabber client.
C. The XMPP bind failed on the IM and Presence server
D. The Jabber client refused the XMPP bind connection.
What is the purpose of checking the CRL during SMTP authentication on a Cisco ESA?
A. Check if the certificate is not revoked.
B. Confirm that corresponding CA is present.
C. Verify the common name matches user ID.
D. Validate the date to check if the certificate is still valid.
What it is the purpose of using ICE for Mobile and Remote Access endpoints in the Cisco Collaboration infrastructure?
A. ICE controls the bandwidth usage for Cisco Collaboration endpoints if the endpoints are located outside the company network.
B. ICE enables Cisco Collaboration endpoints to determine if there is direct connectivity between them.
C. ICE uses FAST updates to optimize the video quality in case of packet loss. This technology is available only from Cisco Unified CM version 11.5 and later.
D. ICE enablement allows for the Cisco Collaboration endpoint to register through Expressway servers to Cisco Unified Communications Manager behind a firewall.
An administrator is configuring a new Cisco Webex Hybrid Message Service deployment, and the Expressway-C Message Connector is successfully registered in the Control Hub. After the server information of the IM and Presence server is added to the Expressway-C, an error “Connectivity to IM and Presence AXL Service could not be established” is displayed in the Control Hub. The Cisco AXL Web Service is enabled on the IM and Presence Service publisher, and the main administrator account enabled for AXL API permission is being used. Which configuration change must be made to resolve this error?
A. Enable the Cisco AXL Web Service on the Control Hub
B. Enable the Cisco AXL Web Service on the Expressway-C Message Connector
C. Enable an End User account for AXL.API permissions on the IM and Presence Service publisher
D. Enable a second administrator account for AXL API permissions on the IM and Presence Service publisher
Refer to the exhibit. An engineer needs to change the existing Forged Email Detection message filter so that it references a newly created dictionary named ‘Executives’. What should be done to accomplish this task?
A. Change “from” to “Executives”.
B. Change “TEST” to “Executives”.
C. Change “fed” to “Executives”.
D. Change “support” to “Executives”.
Which DNS record and port combination must be resolved externally for Mobile and Remote Access to be used?
A. _collab-edge on port 8443
B. _cisco-uds-edge on port 5061
C. _collab-edge on port 5061
D. _cisco-uds on port 8443
Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?
A. A policy quarantine is missing.
B. More than one email pipeline is defined.
C. The “modify the message subject” is already set.
D. The “add custom header” action is performed first.
Cisco Expressways are being deployed for Mobile and Remote Access. The Expressway-E internal interface (LAN1) IP is 192.168.100.10/24, and the external interface (LAN2) IP is 172.16.100.10/24. The Expressway-C IP is 192.168.20.10/24. The default gateway for each subnet is the first useable address. How must the Expressway-E be configured to allow proper routing to the internal and external networks?
A. IPv4 gateway: 172.16.100.1, and a static route for the 192.168.100.0/24 subnet using LAN1
B. IPv4 gateway: 192.168.100.1, and a static route for the 192.168.20.0/24 subnet using LAN1
C. IPv4 gateway: 192.168.100.1, and a static route for the 172.16.100.0/24 subnet using LAN2
D. IP v4 gateway: 172.16.100.1, and a static route for the 192.168.20.0/24 subnet using LAN1
What must be considered when viewing spam messages addressed to an email alias on Cisco ESA?
A. It is only possible via a link in a notification.
B. It is only possible via a web browser directly.
C. The access is granted via any method.
D. It is impossible via mailbox authentication.
What is the name of the Webex core service that delivers group messaging, one-to-one messaging, presence, and file sharing?
A. Cisco Webex Messaging
B. Cisco Webex App
C. Cisco Webex ONE
D. Cisco Jabber Online
When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)
A. DKIM
B. Public Keys
C. Domain Keys
D. Symmetric Keys
E. Private Keys
Refer to the exhibit. Which configuration allows the Cisco ESA to scan for executables inside the zip and apply the action as per the content filter?
A. Modify the content filter to look for .exe filename instead of executable filetype.
B. Configure the recursion depth to a higher value.
C. Configure the maximum attachment size to a higher value.
D. Modify the content filter to look for attachment filetype of compressed.
What are organizations trying to address when implementing a SPAM quarantine?
A. true positives
B. false negatives
C. false positives
D. true negatives
An administrator needs to configure Cisco ESA to ensure that emails are sent and authorized by the owner of the domain. Which two steps must be performed to accomplish this task? (Choose two.)
A. Generate keys.
B. Create signing profile.
C. Create Mx record.
D. Enable SPF verification.
E. Create DMARC profile.
A network administrator is modifying an outgoing mail policy to enable domain protection for the organization. A DNS entry is created that has the public key. Which two headers will be used as matching criteria in the outgoing mail policy? (Choose two.)
A. message-ID
B. sender
C. URL reputation
D. from
E. mail-from
Which step is required when configuring Cisco Webex Hybrid Message Service?
A. Register Expressway-C Connector Hosts to the Cisco Webex Cloud.
B. Register Expressway-C to Cisco Unified Communications Manager.
C. Add Expressway-C and Cisco United CM to the Cisco Webex Cloud.
D. Add Cisco Unity Connection to Expressway-E.
Which media encryption mode can be configured on an Expressway zone?
A. Advanced Encryption Standard
B. IPsec
C. Triple Data Encryption Standard
D. force unencrypted
Refer to the exhibit. Which SIP trunk security profile configuration on the Cisco UCM server is used for a secured SIP trunk to an Expressway server that is already integrated with the Cisco UCM for Mobile and Remote Access?
A. Device Security Mode: Encrypted -Incoming Transport Type: TLS -Outgoing Transport Type: TLS -Incoming Port*: 5061
B. Device Security Mode: Encrypted -Incoming Transport Type: TLS -Outgoing Transport Type: TLS -Incoming Port*: 6061
C. Device Security Mode: Non-SecureIncoming Transport Type: TCP+UDPOutgoing Transport Type: TCP -Incoming Port*: 5060
D. Device Security Mode: AuthenticatedIncoming Transport Type: TLS -Outgoing Transport Type: TLS -Incoming Port*: 6061
Which attribute in the SDP for a call is affected by the static NAT address configuration in an Expressway-E?
A. connection
B. name
C. version
D. bandwidth
What is a benefit of deploying Cisco SMA?
A. centralized management of logs for Cisco ESA appliances
B. centralized management of botnet directories
C. centralized management of software updates for Cisco ESA appliances
D. centralized management of quarantined email
Which statement about scheduling Expressway backups is true?
A. It is not supported on the application.
B. It is allowed from the application CLI of the Expressway only.
C. It is allowed from the application CLI and GUI of the Expressway.
D. It is allowed from the application GUI of the Expressway only.
In a Mobile and Remote Access deployment, where must communications be encrypted with TLS?
A. Cisco Expressway-E and endpoints outside the enterprise
B. Cisco Expressway-C, Cisco Unified Communications Manager, and IM&P
C. Cisco Expressway-C, Cisco Expressway-E, and Cisco Unified Communications Manager
D. Cisco Expressway-C, Cisco Expressway-E, and endpoints outside the enterprise
An administrator manipulated the subnet mask but was still unable to access the user interface. How must the administrator access the appliance to perform the initial configuration?
A. Use the data 2 port.
B. Use the serial or console port.
C. Use the data 1 port.
D. Use the management port.
Access Full 300-820 Exam Prep Free
Want to go beyond these 50 questions? Click here to unlock a full set of 300-820 exam prep free questions covering every domain tested on the exam.
We continuously update our content to ensure you have the most current and effective prep materials.
Good luck with your 300-820 certification journey!