300-720
Free trial
Verified
Question 1
Which SMTP extension does Cisco ESA support for email security?
- A: ETRN
- B: UTF8SMTP
- C: PIPELINING
- D: STARTTLS
Question 2
Which antispam feature is utilized to give end users control to allow emails that are spam to be delivered to their inbox, overriding any spam verdict and action on the Cisco ESA?
- A: end user allow list
- B: end user spam quarantine access
- C: end user passthrough list
- D: end user safelist
Question 3
A network administrator enabled McAfee antivirus scanning on a Cisco ESA and configured the virus scanning action of “scan for viruses only.” If the scanner finds a virus in an attachment for an incoming email, what action will be applied to this message?
- A: The attachment is dropped and replaced with a “Removed Attachment” file.
- B: The email and attachment are forwarded to the network administrator.
- C: The system will attempt to repair the attachment.
- D: No repair is attempted, and the attachment is either dropped or delivered.
Question 4
Refer to the exhibit. For improved security, an administrator wants to warn users about opening any links or attachments within an email. How must the administrator configure an HTML-coded message at the top of an email body to create this warning?
- A: Create a text resource type of Notification Template, change to code view to paste the HTML code into the text box, then use this text resource inside a content filter.
- B: Create a text resource type of Disclaimer Template, change to code view to paste the HTML code into the text box, then use this text resource inside a content filter.
- C: Create a text resource type of Disclaimer Template, past the HTML code into the text box, then use this text resource inside a content filter.
- D: Create a text resource type of Notification Template, past the HTML code into the text box, then use this text resource inside a content filter.
Question 5
An engineer is tasked with creating a content filter to catch attachments, including credit card numbers, and hold them for review until further action is taken. Which component on a Cisco ESA must be configured to meet this requirement?
- A: Spam Quarantine
- B: Outbreak Filter
- C: Policy Quarantine
- D: Content Filter
Question 6
A list of company executives is routinely being spoofed, which puts the company at risk of malicious email attacks. An administrator must ensure that executive messages are originating from legitimate sending addresses. Which two steps must be taken to accomplish this task? (Choose two.)
- A: Create an incoming content filter with SPF detection.
- B: Create a content dictionary including a list of the names that are being spoofed.
- C: Enable the Forged Email Detection feature under Security Settings.
- D: Enable DMARC feature under Mail Policies.
- E: Create an incoming content filter with the Forged Email Detection condition.
Question 7
Refer to the exhibit. Which configuration allows the Cisco ESA to scan for executables inside the zip and apply the action as per the content filter?
- A: Modify the content filter to look for .exe filename instead of executable filetype.
- B: Configure the recursion depth to a higher value.
- C: Configure the maximum attachment size to a higher value.
- D: Modify the content filter to look for attachment filetype of compressed.
Question 8
A network engineer is implementing a virus outbreak filter on a Cisco ESA by using the Outbreak Filters feature with plans to perform an additional scan by using a content filter. Which action must be taken by the Outbreak Filters?
- A: Scan processed messages by using two engines simultaneously.
- B: Send a copy of messages to quarantine.
- C: Send processed messages to the Cisco ESA.
- D: Scan processed messages by using a secondary instance of the Cisco ESA.
Question 9
An organization wants to prevent proprietary patent documents from being shared externally via email. The network administrator reviewed the DLP policies on the Cisco ESA and could not find an existing policy with the appropriate matching patterns. Which type of DLP policy template must be used to create a policy that meets this requirement?
- A: regulatory compliance
- B: acceptable use
- C: custom policy
- D: privacy protection
Question 10
An administrator notices that incoming emails with certain attachments do not get delivered to all recipients when the emails have multiple recipients in different domains like cisco.com and test.com. The same emails when sent only to recipients in cisco.com are delivered properly. How must the Cisco ESA be configured to avoid this behavior?
- A: Modify DLP configuration to ensure that all attachments are permitted for test.com.
- B: Modify DLP configuration to exempt DLP scanning for messages sent to test.com domain.
- C: Modify mail policies so email recipients do not match multiple policies.
- D: Modify mail policies for cisco.com to ensure that emails are not dropped.
Question 11
Which content filter condition checks to see if the “From: header” in the message is similar to any of the users in the content dictionary?
- A: SPF Verification
- B: Duplicate Boundaries Verification
- C: Forged Email Detection
- D: Subject Header
Question 12
A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”
Which feature must be used to address this?
- A: DHAP
- B: SBRS
- C: LDAP
- D: SMTP
Question 13
What are two prerequisites for implementing undesirable URL protection in Cisco ESA? (Choose two.)
- A: Enable outbreak filters.
- B: Enable email relay.
- C: Enable antispam scanning.
- D: Enable port bouncing.
- E: Enable antivirus scanning.
Question 14
Refer to the exhibits. What must be done to enforce end user authentication before accessing quarantine?
- A: Enable SPAM notification and use LDAP for authentication.
- B: Enable SPAM Quarantine Notification and add the %quarantine_url% variable.
- C: Change the end user quarantine access from None authentication to SAAS.
- D: Change the end user quarantine access setting from None authentication to Mailbox.
Question 15
An engineer is configuring a Cisco ESA for the first time and needs to ensure that any email traffic coming from the internal SMTP servers is relayed out through the Cisco ESA and is tied to the Outgoing Mail Policies.
Which Mail Flow Policy setting should be modified to accomplish this goal?
- A: Exception List
- B: Connection Behavior
- C: Bounce Detection Signing
- D: Reverse Connection Verification
Question 16
An organization wants to use its existing Cisco ESA to host a new domain and enforce a separate corporate policy for that domain.
What should be done on the Cisco ESA to achieve this?
- A: Use the smtproutes command to configure a SMTP route for the new domain.
- B: Use the deliveryconfig command to configure mail delivery for the new domain.
- C: Use the dsestconf command to add a separate destination for the new domain.
- D: Use the altrchost command to add a separate gateway for the new domain.
Question 17
An engineer is configuring an SMTP authentication profile on a Cisco ESA which requires certificate verification.
Which section must be configured to accomplish this goal?
- A: Mail Flow Policies
- B: Sending Profiles
- C: Outgoing Mail Policies
- D: Verification Profiles
Question 18
What is the default primary email attribute used in a spam quarantine end-user authentication query when using LDAP authentication to an Active Directory server?
- A: userAccount
- B: mailLocalAddress
- C: sAMAccountName
- D: proxyAddresses
Question 19
Which components are required when encrypting SMTP with TLS on Cisco ESA when the sender requires TLS verification?
- A: self-signed certificate in PKCS#7 format
- B: X.509 certificate and matching private key from a CA
- C: self-signed certificate in PKCS#12 format
- D: DER certificate and matching public key from a CA
Question 20
The Cisco ESA is processing many messages that are sent to invalid recipients. To reduce this excessive processing, an engineer is preparing to use LDAP for recipient verification. Which two steps are required to accomplish this task? (Choose two.)
- A: Configure LDAP server profiles.
- B: Enable external LDAP authentication.
- C: Configure the LDAP query.
- D: Enable LDAP authentication on a listener.
- E: Configure incoming mail policy to query LDAP server.
Question 21
DRAG DROP
Drag and drop the SMTP Call-Ahead Server Profile Settings from the left onto the descriptions on the right.
Question 22
An engineer is reviewing the SMTP routing table on a Cisco ESA using the smtproutes CLI command and discovers an IPv6 route for 2620:104:4360:9232::23. What type of IPv6 route does this represent?
- A: Network route
- B: Subnet route
- C: Device route
- D: Prefix route
Question 23
An engineer must limit responses from the gateway that are directed to invalid email addresses. How should the LDAP server be configured to accomplish this goal?
- A: Validate the sender email address via an LDAP query during the SMTP conversation.
- B: Validate the sender email address via SMTP Call-Ahead to query an external SMTP server.
- C: Limit the number of invalid recipients per sender to stop responses after crossing the threshold.
- D: Limit the number of invalid responses per recipient to stop responses after crossing the threshold.
Question 24
DRAG DROP -
Drag and drop the steps to configure Cisco ESA to use SPF/SIDF verification from the left into the correct order on the right.
Select and Place:
Question 25
Which component must be added to the content filter to trigger on failed SPF Verification or DKIM Authentication verdicts?
- A: status
- B: response
- C: parameter
- D: condition
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!