Which two factors must be considered when message filter processing is configured? (Choose two.)
Which two factors must be considered when message filter processing is configured? (Choose two.) A. message-filter order B. lateral processing C. structure of the combined packet D. mail policies E. MIME structure of the messageView AnswerAnswer: AE Explanation: Message-filter order and MIME structure of the message are two factors that...
Which SMTP extension does Cisco ESA support for email security?
Which SMTP extension does Cisco ESA support for email security?A . ETRNB . UTF8SMTPC . PIPELININGD . STARTTLSView AnswerAnswer: D Explanation: STARTTLS is an SMTP extension that allows email servers to negotiate a secure connection using TLS or SSL encryption. Cisco ESA supports STARTTLS for both inbound and outbound email...
Which attack is mitigated by using Bounce Verification?
Which attack is mitigated by using Bounce Verification? A. spoof B. denial of service C. eavesdropping D. smurfView AnswerAnswer: B Explanation: Bounce Verification is a feature that mitigates denial of service attacks on Cisco ESA. A denial of service attack is an attempt to overwhelm a system or network with...
Which two action types are performed by Cisco ESA message filters? (Choose two.)
Which two action types are performed by Cisco ESA message filters? (Choose two.)A . non-final actionsB . filter actionsC . discard actionsD . final actionsE . quarantine actionsView AnswerAnswer: AD Explanation: Non-final actions are actions that do not terminate the message filter evaluation, such as adding headers, setting variables, logging,...
What is the order of virus scanning when multilayer antivirus scanning is configured?
What is the order of virus scanning when multilayer antivirus scanning is configured?A . The default engine scans for viruses first and the McAfee engine scans for viruses second.B . The Sophos engine scans for viruses first and the McAfee engine scans for viruses second.C . The McAfee engine scans...
What is the default behavior of any listener for TLS communication?
What is the default behavior of any listener for TLS communication?A . preferred-verifyB . offC . preferredD . requiredView AnswerAnswer: B Explanation: The default behavior of any listener for TLS communication is B. off. This means that TLS is not allowed for incoming connections to the listener and connections to...
Which two steps are needed to disable local spam quarantine before external quarantine is enabled? (Choose two.)
Which two steps are needed to disable local spam quarantine before external quarantine is enabled? (Choose two.) A. Uncheck the Enable Spam Quarantine check box. B. Select Monitor and click Spam Quarantine. C. Check the External Safelist/Blocklist check box. D. Select External Spam Quarantine and click on Configure. E. Select...
How does the graymail safe unsubscribe feature function?
How does the graymail safe unsubscribe feature function?A . It strips the malicious content of the URI before unsubscribing.B . It checks the URI reputation and category and allows the content filter to take an action on it.C . It redirects the end user who clicks the unsubscribe button to...
Which two query types are available when an LDAP profile is configured? (Choose two.)
Which two query types are available when an LDAP profile is configured? (Choose two.) A. proxy consolidation B. user C. recursive D. group E. routingView AnswerAnswer: BE Explanation: User and routing are two query types that are available when an LDAP profile is configured on Cisco ESA. User queries are...
What is the maximum message size that can be configured for encryption on the Cisco ESA?
What is the maximum message size that can be configured for encryption on the Cisco ESA?A . 20 MBB . 25 MBC . 15 MBD . 30 MBView AnswerAnswer: B Explanation: The maximum message size that can be configured for encryption on the Cisco ESA is 25 MB. This is...