Email encryption is configured on a Cisco ESA that uses CRES.
Which action is taken on a message when CRES is unavailable?
AIt is requeued.
BIt is sent in clear text.
CIt is dropped and an error message is sent to the sender.
DIt is encrypted by a Cisco encryption appliance.
Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)
ANetFlow
Bgeolocation-based filtering
Cheuristic-based filtering
Dsenderbase reputation filtering
Econtent disarm and reconstruction
Which process is skipped when an email is received from safedomain.com, which is on the safelist?
Amessage filter
Bantivirus scanning
Coutbreak filter
Dantispam scanning
An analyst creates a new content dictionary to use with Forged Email Detection.
Which entry will be added into the dictionary?
Amycompany.com
BAlpha Beta
C^Alpha\ Beta$
D[email protected]
Which two steps configure Forged Email Detection? (Choose two.)
AConfigure a content dictionary with executive email addresses.
BConfigure a filter to use the Forged Email Detection rule and dictionary.
CConfigure a filter to check the Header From value against the Forged Email Detection dictionary.
DEnable Forged Email Detection on the Security Services page.
EConfigure a content dictionary with friendly names.
What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?
Aprovisioned email encryption profile
Bmessage encryption from a content filter that select "Message Encryption" over TLS
Cmessage encryption from the mail flow policies with "CRES" selected
Dcontent filter to forward the email to the Cisco Registered Envelope server
When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)
ADKIM
BPublic Keys
CDomain Keys
DSymmetric Keys
EPrivate Keys
Which two action types are performed by Cisco ESA message filters? (Choose two.)
Anon-final actions
Bfilter actions
Cdiscard actions
Dfinal actions
Equarantine actions
Which setting affects the aggressiveness of spam detection?
Aprotection level
Bspam threshold
Cspam timeout
Dmaximum depth of recursion scan
What are two phases of the Cisco ESA email pipeline? (Choose two.)
Areject
Bworkqueue
Caction
Ddelivery
Equarantine
What is the order of virus scanning when multilayer antivirus scanning is configured?
AThe default engine scans for viruses first and the McAfee engine scans for viruses second.
BThe Sophos engine scans for viruses first and the McAfee engine scans for viruses second.
CThe McAfee engine scans for viruses first and the default engine scans for viruses second.
DThe McAfee engine scans for viruses first and the Sophos engine scans for viruses second.
Which scenario prevents a message from being sent to the quarantine as an action in the scan behavior on Cisco ESA?
AA policy quarantine is missing.
BMore than one email pipeline is defined.
CThe "modify the message subject" is already set.
DThe "add custom header" action is performed first.
An administrator is trying to enable centralized PVO but receives the error, "Unable to proceed with Centralized Policy, Virus and Outbreak Quarantines configuration as esa1 in Cluster has content filters / DLP actions available at a level different from the cluster level."
What is the cause of this error?
AContent filters are configured at the machine-level on esa1.
BDLP is configured at the cluster-level on esa2.
CDLP is configured at the domain-level on esa1.
DDLP is not configured on host1.
What is the maximum message size that can be configured for encryption on the Cisco ESA?
A20 MB
B25 MB
C15 MB
D30 MB
Which method enables an engineer to deliver a flagged message to a specific virtual gateway address in the most flexible way?
ASet up the interface group with the flag.
BIssue the altsrchost command.
CMap the envelope sender address to the host.
DApply a filter on the message.
Which feature must be configured before an administrator can use the outbreak filter for nonviral threats?
Aquarantine threat level
Bantispam
Cdata loss prevention
Dantivirus
Which suboption must be selected when LDAP is configured for Spam Quarantine End-User Authentication?
ADesignate as the active query
BUpdate Frequency
CServer Priority
DEntity ID
Which antispam feature is utilized to give end users control to allow emails that are spam to be delivered to their inbox, overriding any spam verdict and action on the Cisco ESA?
Aend user allow list
Bend user spam quarantine access
Cend user passthrough list
Dend user safelist
When outbreak filters are configured, which two actions are used to protect users from outbreaks? (Choose two.)
Aredirect
Breturn
Cdrop
Ddelay
Eabandon
Which two components form the graymail management solution in Cisco ESA? (Choose two.)
Acloud-based unsubscribe service
Buniform unsubscription management interface for end users
Csecure subscribe option for end users
Dintegrated graymail scanning engine
Eimproved mail efficacy
What is the default HTTPS port when configuring spam quarantine on Cisco ESA?
A83
B82
C443
D80
What are two primary components of content filters? (Choose two.)
Aconditions
Bsubject
Ccontent
Dactions
Epolicies
Which two configurations are used on multiple LDAP servers to connect with Cisco ESA? (Choose two.)
Aload balancing
BSLA monitor
Cactive-standby
Dfailover
Eactive-active
Which two steps are needed to disable local spam quarantine before external quarantine is enabled? (Choose two.)
AUncheck the Enable Spam Quarantine check box.
BSelect Monitor and click Spam Quarantine.
CCheck the External Safelist/Blocklist check box.
DSelect External Spam Quarantine and click on Configure.
ESelect Security Services and click Spam Quarantine.
Which two actions are configured on the Cisco ESA to query LDAP servers? (Choose two.)