Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two certificate authority lists are available in Cisco ESA? (Choose two.)

A.

default

B.

system

C.

user

D.

custom

E.

demo

When email authentication is configured on Cisco ESA, which two key types should be selected on the signing profile? (Choose two.)

A.

DKIM

B.

Public Keys

C.

Domain Keys

D.

Symmetric Keys

E.

Private Keys

What must be configured to allow the Cisco ESA to encrypt an email using the Cisco Registered Envelope Service?

A.

provisioned email encryption profile

B.

message encryption from a content filter that select " Message Encryption " over TLS

C.

message encryption from the mail flow policies with " CRES " selected

D.

content filter to forward the email to the Cisco Registered Envelope server

A network administrator notices that there are a high number of queries to the LDAP server. The mail logs show an entry “550 Too many invalid recipients | Connection closed by foreign host.”

Which feature must be used to address this?

A.

DHAP

B.

SBRS

C.

LDAP

D.

SMTP

A security engineer wants to ensure that legitimate emails from info@partners.com are not quarantined as spam in Cisco Secure Email. Which action must be taken to meet this requirement?

A.

Remove the domain from the Wocklist.

B.

Add the domain to the allowlist.

C.

Add the domain to the safelist.

D.

Add all partners.com email addresses to the allowlist.

Which type of query must be configured when setting up the Spam Quarantine while merging notifications?

A.

Spam Quarantine Alias Routing Query

B.

Spam Quarantine Alias Consolidation Query

C.

Spam Quarantine Alias Authentication Query

D.

Spam Quarantine Alias Masquerading Query

A company ' s CFO is requesting the email administrator create an exception for graymail from a certain yoga studio ' s weekly newsletter. Which category of graymail does this fall under?

A.

Mass

B.

Marketing

C.

Social Network

D.

Sales

A Cisco ESA administrator was notified that a user wa s not receiving emails from a specific domain. After reviewing the mail logs, the sender had a negative sender-based reputation score.

What should the administrator do to allow inbound email from that specific domain?

A.

Create a new inbound mail polic y with a message filter that overrides Talos.

B.

Ask the user to add the sender to the email application ' s allow list.

C.

Modify the firewall to allow emails from the domain.

D.

Add the domain into the allow list.

An organization wants to use DMARC to improve its brand reputation by leveraging DNS records.

Which two email authentica tion mechanisms are utilized during this process? (Choose two.)

A.

SPF

B.

DSTP

C.

DKIM

D.

TLS

E.

PKI

An engineer must add the user1@cisco.co m with an IP address of 10.1.1.13 to a safelist in Cisco Secure Email Gateway. Which two safelist syntaxes must be configured to meet the requirement? (Choose two.)

A.

[10.1.1.16/30]

B.

user1@ [10.1.1.13]

C.

[10.1.1.0/24]

D.

[10.1.1.13/30]