Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What are two primary components of content filters? (Choose two.)

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Full Access
Question # 5

Which two features are applied to either incoming or outgoing mail policies? (Choose two.)

A.

Indication of Compromise

B.

application filtering

C.

outbreak filters

D.

sender reputation filtering

E.

antivirus

Full Access
Question # 6

Refer to the exhibits. What must be done to enforce end user authentication before accessing quarantine?

A.

Enable SPAM notification and use LDAP for authentication.

B.

Enable SPAM Quarantine Notification and add the %quarantine_url% variable.

C.

Change the end user quarantine access from None authentication to SAAS.

D.

Change the end user quarantine access setting from None authentication to Mailbox.

Full Access
Question # 7

Spammers routinely try to send emails with the recipient field filled with a list of all possible combinations of letters and numbers. These combinations, appended with a company domain name are malicious attempts at learning all possible valid email addresses. Which action must be taken on a Cisco Secure Email Gateway to prevent this from occurring?

A.

Select the SMTP Authentication Query checkbox

B.

Perform LDAP acceptance validation.

C.

Quarantine external authentication queries.

D.

Enable end user safelist features

Full Access
Question # 8

What are organizations trying to address when implementing a SPAM quarantine?

A.

true positives

B.

false negatives

C.

false positives

D.

true negatives

Full Access
Question # 9

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

A.

default

B.

system

C.

user

D.

custom

E.

demo

Full Access
Question # 10

Which feature must be activated on a Cisco Secure Email Gateway to combat backscatter?

A.

Graymail Detection

B.

Bounce Verification

C.

Forged Email Detection

D.

Bounce Profile

Full Access
Question # 11

What are two primary components of content filters? (Choose two.)

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Full Access
Question # 12

Which Cisco Secure Email Threat Defense visibility and remediation mode is only available when using Cisco Secure Email Gateway as the message source?

A.

Basic Authentication

B.

No Authentication

C.

Microsoft 365 Authentication

D.

Cisco Security Cloud Sign On

Full Access
Question # 13

Which action on the Cisco ESA provides direct access to view the safelist/blocklist?

A.

Show the SLBL cache on the CLI.

B.

Monitor Incoming/Outgoing Listener.

C.

Export the SLBL to a .csv file.

D.

Debug the mail flow policy.

Full Access
Question # 14

A security administrator deployed a Cisco Secure Email Gateway appliance with a mail policy configured to store suspected spam for review. The appliance is the DMZ and only the standard HTTP/HTTPS ports are allowed by the firewall. An administrator wants to ensure that users can view any suspected spam that was blocked. Which action must be taken to meet this requirement?

A.

Enable the external Spam Quarantine and enter the IP address and port for the Secure Email and Web Manager

B.

Enable the Spam Quarantine and leave the default settings unchanged.

C.

Enable End-User Quarantine Access and point to an LDAP server for authentication.

D.

Enable the Spam Quarantine and specify port 80 for HTTP and port 443 for HTTPS

Full Access
Question # 15

An Encryption Profile has been set up on the Cisco ESA.

Drag and drop the steps from the left for creating an outgoing content filter to encrypt emails that contains the subject "Secure:" into the correct order on the right.

Full Access
Question # 16

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Full Access
Question # 17

The CEO added a sender to a safelist but does not receive an important message expected from the trusted sender. An engineer evaluates message tracking on the Cisco Secure Email Gateway appliance and determines that the message was dropped by the antivirus engine. What is the reason for this behavior?

A.

The sender is included in an ISP blocklist

B.

Administrative access is required to create a safelist.

C.

The sender didn't mark the message as urgent

D.

End-user safelists apply to antispam engines only.

Full Access
Question # 18

Spreadsheets containing credit card numbers are being allowed to bypass the Cisco ESA.

Which outgoing mail policy feature should be configured to catch this content before it leaves the network?

A.

file reputation filtering

B.

outbreak filtering

C.

data loss prevention

D.

file analysis

Full Access
Question # 19

Refer to the exhibit. An engineer needs to change the existing Forged Email Detection message filter so that it references a newly created dictionary named ‘Executives’.

What should be done to accomplish this task?

A.

Change "from" to "Executives".

B.

Change "TESF to "Executives".

C.

Change fed' to "Executives".

D.

Change "support" to "Executives".

Full Access
Question # 20

When the Spam Quarantine is configured on the Cisco ESA, what validates end-users via LDAP during login to the End-User Quarantine?

A.

Enabling the End-User Safelist/Blocklist feature

B.

Spam Quarantine External Authentication Query

C.

Spam Quarantine End-User Authentication Query

D.

Spam Quarantine Alias Consolidation Query

Full Access
Question # 21

What are two primary components of content filters? (Choose two.)

A.

conditions

B.

subject

C.

content

D.

actions

E.

policies

Full Access
Question # 22

Which two steps configure Forged Email Detection? (Choose two.)

A.

Configure a content dictionary with executive email addresses.

B.

Configure a filter to use the Forged Email Detection rule and dictionary.

C.

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.

Enable Forged Email Detection on the Security Services page.

E.

Configure a content dictionary with friendly names.

Full Access
Question # 23

What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)

A.

Enable outbreak filters.

B.

Enable email relay.

C.

Enable antispam scanning.

D.

Enable port bouncing.

E.

Enable antivirus scanning.

Full Access
Question # 24

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

Full Access
Question # 25

Which two components form the graymail management solution in Cisco ESA? (Choose two.)

A.

cloud-based unsubscribe service

B.

uniform unsubscription management interface for end users

C.

secure subscribe option for end users

D.

integrated graymail scanning engine

E.

improved mail efficacy

Full Access
Question # 26

Which restriction is in place for end users accessing the spam quarantine on Cisco Secure Email Gateway appliances?

A.

Access via a link in a notification is mandatory.

B.

The end user must be assigned to the Guest role

C.

Direct access via web browser requires authentication.

D.

Authentication is required when accessing via a link in a notification.

Full Access
Question # 27

Which cloud service provides a reputation verdict for email messages based on the sender domain and other attributes?

A.

Cisco AppDynamics

B.

Cisco Secure Email Threat Defense

C.

Cisco Secure Cloud Analytics

D.

Cisco Talos

Full Access
Question # 28

Refer to the exhibit.

A network engineer must set up a content filter to find any messages that failed SPF and send them into quarantine The content filter has been set up and enabled, but all messages except those that have failed SPF are being sent into quarantine. Which section of the filter must be modified to correct this behavior?

A.

skip-filters

B.

log-entry

C.

spf-status

D.

quarantine

Full Access
Question # 29

An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)

A.

domains

B.

senders

C.

reputation score

D.

receivers

E.

spf check

Full Access
Question # 30

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: must be entered. What must be added to the dictionary to accomplish this goal?

A.

example.com

B.

Example CEO

C.

ceo

D.

ceo@example com

Full Access
Question # 31

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Full Access
Question # 32

An administrator notices that the Cisco Secure Email Gateway delivery queue on an appliance is consistently full. After further investigation, it is determined that the IP addresses currently in use by appliance are being rate-limited by some destinations. The administrator creates a new interface with an additional IP address using virtual gateway technology, but the issue is not solved Which configuration change resolves the issue?

A.

Use the CLI command altsrchost to set the new interface as the source IP address for all mail.

B.

Use the CLI command loadbalance auto to enable mail delivery over all interfaces.

C.

Use the CLI command alt-src-host to set the new interface as a possible delivery candidate.

D.

Use the CLI command deliveryconfig to set the new interface as the primary interface for mail delivery

Full Access
Question # 33

How does the graymail safe unsubscribe feature function?

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Full Access
Question # 34

Which benefit does enabling external spam quarantine on Cisco SMA provide?

A.

ability to back up spam quarantine from multiple Cisco ESAs to one central console

B.

access to the spam quarantine interface on which a user can release, duplicate, or delete

C.

ability to scan messages by using two engines to increase a catch rate

D.

ability to consolidate spam quarantine data from multiple Cisco ESA to one central console

Full Access
Question # 35

Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?

A.

Set up the interface group with the flag.

B.

Issue the altsrchost command.

C.

Map the envelope sender address to the host.

D.

Apply a filter on the message.

Full Access
Question # 36

Which process is skipped when an email is received from safedomain.com, which is on the safelist?

A.

message filter

B.

antivirus scanning

C.

outbreak filter

D.

antispam scanning

Full Access
Question # 37

Which action on the Cisco ESA provides direct access to view the safelist/blocklist?

A.

Show the SLBL cache on the CLI.

B.

Monitor Incoming/Outgoing Listener.

C.

Export the SLBL to a .csv file.

D.

Debug the mail flow policy.

Full Access
Question # 38

A content dictionary was created for use with Forged Email Detection. Proper data that pertains to the CEO Example CEO: must be entered. What must be added to the dictionary to accomplish this goal?

A.

example.com

B.

Example CEO

C.

ceo

D.

ceo@example com

Full Access
Question # 39

What is the default port to deliver emails from the Cisco ESA to the Cisco SMA using the centralized Spam Quarantine?

A.

8025

B.

6443

C.

6025

D.

8443

Full Access
Question # 40

The company security policy requires that the finance department have an easy way to apply encryption to their outbound messages that contain sensitive data Users must be able to flag the messages that require encryption versus a Cisco Secure Email Gateway appliance scanning all messages and automatically encrypting via detection Which action enables this capability?

A.

Create an encryption profile with [SECURE] in the Subject setting and enable encryption on the mail flow policy

B.

Create an outgoing content filter with no conditions and with the Encrypt and Deliver Now action configured with [SECURE] in the Subject setting

C.

Create an encryption profile and an outgoing content filter that includes \[SECURE\] within the Subject Header: Contains condition along with the Encrypt and Deliver Now action

D.

Create a DLP policy manager message action with encryption enabled and apply it to active DLP policies for outgoing mail.

Full Access
Question # 41

Drag and drop the AsyncOS methods for performing DMARC verification from the left into the correct order on the right.

Full Access
Question # 42

Which setting affects the aggressiveness of spam detection?

A.

protection level

B.

spam threshold

C.

spam timeout

D.

maximum depth of recursion scan

Full Access
Question # 43

Which SMTP extension does Cisco ESA support for email security?

A.

ETRN

B.

UTF8SMTP

C.

PIPELINING

D.

STARTTLS

Full Access
Question # 44

A Cisco Secure Email Gateway administrator must provide outbound email authenticity and configures a DKIM signing profile to handle this task. What is the next step to allow this organization to use DKIM for their outbound email?

A.

Enable the DKIM service checker

B.

Export the DNS TXT record to provide to the DNS registrar

C.

Import the DNS record of the service provider into the Cisco Secure Email Gateway.

D.

Configure the Trusted Sender Group message authenticity policy.

Full Access