Drag and drop the steps to configure Cisco ESA to use SPF/SIDF verification from the left into the correct order on the right

DRAG DROP Drag and drop the steps to configure Cisco ESA to use SPF/SIDF verification from the left into the correct order on the right. View AnswerAnswer:

October 11, 2023 No Comments READ MORE +

Which two steps configure Forged Email Detection? (Choose two.)

Which two steps configure Forged Email Detection? (Choose two.)A . Configure a content dictionary with executive email addresses.B . Configure a filter to use the Forged Email Detection rule and dictionary.C . Configure a filter to check the Header From value against the Forged Email Detection dictionary.D . Enable Forged...

October 11, 2023 No Comments READ MORE +

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)A . DKIMB . Public KeysC . Domain KeysD . Symmetric KeysE . Private KeysView AnswerAnswer: BE Explanation: With DomainKeys or DKIM email authentication, the sender signs the email using...

October 10, 2023 No Comments READ MORE +

Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.)

Which two statements about configuring message filters within the Cisco ESA are true? (Choose two.) A. The filters command executed from the CLI is used to configure the message filters. B. Message filters configuration within the web user interface is located within Incoming Content Filters. C. The filterconfig command executed...

October 10, 2023 No Comments READ MORE +

What occurs when configuring separate incoming mail policies?

What occurs when configuring separate incoming mail policies? A. message splintering B. message exceptions C. message detachment D. message aggregationView AnswerAnswer: A Explanation: Message splintering is a process that occurs when configuring separate incoming mail policies on Cisco ESA. Message splintering means that Cisco ESA will split a single incoming...

October 10, 2023 No Comments READ MORE +

Which process is skipped when an email is received from safedomain.com, which is on the safelist?

Which process is skipped when an email is received from safedomain.com, which is on the safelist? A. message filter B. antivirus scanning C. outbreak filter D. antispam scanningView AnswerAnswer: D Explanation: The safelist is a list of email addresses or domains that are considered legitimate and trustworthy by Cisco ESA....

October 10, 2023 No Comments READ MORE +

When URL logging is configured on a Cisco ESA, which feature must be enabled first?

When URL logging is configured on a Cisco ESA, which feature must be enabled first?A . antivirusB . antispamC . virus outbreak filterD . senderbase reputation filterView AnswerAnswer: C Explanation: Enabling Logging of URLs and Message Tracking Details for URLs Logging of URL-related logs, and display of this information in...

October 10, 2023 No Comments READ MORE +

Which two are configured in the DMARC verification profile? (Choose two.)

Which two are configured in the DMARC verification profile? (Choose two.)A . name of the verification profileB . minimum number of signatures to verifyC . ESA listeners to use the verification profileD . message action into an incoming or outgoing content filterE . message action to take when the policy...

October 9, 2023 No Comments READ MORE +

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.) A. Enable outbreak filters. B. Enable email relay. C. Enable antispam scanning. D. Enable port bouncing. E. Enable antivirus scanning.View AnswerAnswer: AC Explanation: Undesirable URL protection is a feature that allows Cisco ESA to detect and...

October 9, 2023 No Comments READ MORE +

Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?

Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?A . quarantine threat levelB . antispamC . data loss preventionD . antivirusView AnswerAnswer: B Explanation: The feature that must be configured before an administrator can use the outbreak filter for nonviral threats is antispam....

October 9, 2023 No Comments READ MORE +