Which Cisco technology prevents targeted malware attacks, provides data loss prevention and spam protection, and encrypts email?
Which Cisco technology prevents targeted malware attacks, provides data loss prevention and spam protection, and encrypts email?A . SBAB . secure mobile accessC . IPv6 DMZ web serviceD . ESAView AnswerAnswer: D
What is the maximum message size that the Cisco Email Security Appliance will accept from the violet.public domain?
What is the maximum message size that the Cisco Email Security Appliance will accept from the violet.public domain?A . 1 KBB . 100 KBC . 1 MBD . 10 MBE . 100 MBF . UnlimitedView AnswerAnswer: D
What is a value that Cisco ESA can use for tracing mail flow?
What is a value that Cisco ESA can use for tracing mail flow?A . the source IP addressB . the FQDN of the destination IP addressC . the destination IP addressD . the FQDN of the source IP addressView AnswerAnswer: D
Which policy must you edit to make changes to the Snort preprocessors?
Which policy must you edit to make changes to the Snort preprocessors?A . access control policyB . network discovery policyC . intrusion policyD . file policyE . network analysis policyView AnswerAnswer: A
When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.)
When you configure the Cisco ESA to perform blacklisting, what are two items you can disable to enhance performance? (Choose two.)A . rootkit detectionB . spam scanningC . APT detectionD . antivirus scanningE . URL filteringView AnswerAnswer: BD
WSA?
Refer to the above. What can be determined from this router configuration command for Cisco WSA? A. Traffic using TCP port 80 is redirected to the Cisco WSA. B. The default “cisco” password is configured on the Cisco WSA. C. Traffic denied in prefix-list 80 is redirected to the Cisco...
What is the authentication method for an encryption envelope that is set to medium security?
What is the authentication method for an encryption envelope that is set to medium security?A . The recipient must always enter a password, even if credentials are cached.B . A password is required, but cached credentials are permitted.C . The recipient must acknowledge the sensitivity of the message before it...
How does the WSA policy trace tool make a request to the Proxy to emulate a client request?
How does the WSA policy trace tool make a request to the Proxy to emulate a client request?A . explicitlyB . transparentlyC . via WCCPD . via policy-based routingView AnswerAnswer: D
Which two statement about Cisco Firepower file and intrusion inspection under control policies are true? (Choose two.)
Which two statement about Cisco Firepower file and intrusion inspection under control policies are true? (Choose two.)A . File inspection occurs before intrusion prevention.B . Intrusion Inspection occurs after traffic is blocked by file type.C . File and intrusion drop the same packet.D . Blocking by file type takes precedence...
Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?
Which Cisco Web Security Appliance feature enables the appliance to block suspicious traffic on all of its ports and IP addresses?A . explicit forward modeB . Layer 4 Traffic MonitorC . transparent modeD . Secure Web ProxyView AnswerAnswer: B