Which Cisco technology prevents targeted malware attacks, provides data loss prevention and spam protection, and encrypts email?

Which Cisco technology prevents targeted malware attacks, provides data loss prevention and spam protection, and encrypts email?A . SBAB . secure mobile accessC . IPv6 DMZ web serviceD . ESAView AnswerAnswer: D

September 22, 2018 No Comments READ MORE +

What is the maximum message size that the Cisco Email Security Appliance will accept from the violet.public domain?

What is the maximum message size that the Cisco Email Security Appliance will accept from the violet.public domain?A . 1 KBB . 100 KBC . 1 MBD . 10 MBE . 100 MBF . UnlimitedView AnswerAnswer: D

September 20, 2018 No Comments READ MORE +

What is a value that Cisco ESA can use for tracing mail flow?

What is a value that Cisco ESA can use for tracing mail flow?A . the source IP addressB . the FQDN of the destination IP addressC . the destination IP addressD . the FQDN of the source IP addressView AnswerAnswer: D

September 20, 2018 No Comments READ MORE +

Which policy must you edit to make changes to the Snort preprocessors?

Which policy must you edit to make changes to the Snort preprocessors?A . access control policyB . network discovery policyC . intrusion policyD . file policyE . network analysis policyView AnswerAnswer: A

September 20, 2018 No Comments READ MORE +

When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.)

When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.)A . rootkit detectionB . spam scanningC . APT detectionD . antivirus scanningE . URL filteringView AnswerAnswer: BD

September 19, 2018 No Comments READ MORE +

WSA?

Refer to the above. What can be determined from this router configuration command for Cisco WSA? A. Traffic using TCP port 80 is redirected to the Cisco WSA. B. The default “cisco” password is configured on the Cisco WSA. C. Traffic denied in prefix-list 80 is redirected to the Cisco...

September 18, 2018 No Comments READ MORE +

What is the authentication method for an encryption envelope that is set to medium security?

What is the authentication method for an encryption envelope that is set to medium security?A . The recipient must always enter a password, even if credentials are cached.B . A password is required, but cached credentials are permitted.C . The recipient must acknowledge the sensitivity of the message before it...

September 16, 2018 No Comments READ MORE +

How does the WSA policy trace tool make a request to the Proxy to emulate a client request?

How does the WSA policy trace tool make a request to the Proxy to emulate a client request?A . explicitlyB . transparentlyC . via WCCPD . via policy-based routingView AnswerAnswer: D

September 10, 2018 1 Comment READ MORE +

Which two statement about Cisco Firepower file and intrusion inspection under control policies are true? (Choose two.)

Which two statement about Cisco Firepower file and intrusion inspection under control policies are true? (Choose two.)A . File inspection occurs before intrusion prevention.B . Intrusion Inspection occurs after traffic is blocked by file type.C . File and intrusion drop the same packet.D . Blocking by file type takes precedence...

September 9, 2018 No Comments READ MORE +

Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?

Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?A . explicit forward modeB . Layer 4 Traffic MonitorC . transparent modeD . Secure Web ProxyView AnswerAnswer: B

September 9, 2018 No Comments READ MORE +