Month End Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which two features of Cisco Email Security are added to a Sender Group to protect an organization against email threats? (Choose two.)

A.

NetFlow

B.

geolocation-based filtering

C.

heuristic-based filtering

D.

senderbase reputation filtering

E.

content disarm and reconstruction

An administrator notices that the Cisco Secure Email Gateway delivery queue on an appliance is consistently full. After further investigation, it is determined that the IP addresses currently in use by appliance are being rate-limited by some destinations. The administrator creates a new interface with an additional IP address using virtual gateway technology, but the issue is not solved Which configuration change resolves the issue?

A.

Use the CLI command altsrchost to set the new interface as the source IP address for all mail.

B.

Use the CLI command loadbalance auto to enable mail delivery over all interfaces.

C.

Use the CLI command alt-src-host to set the new interface as a possible delivery candidate.

D.

Use the CLI command deliveryconfig to set the new interface as the primary interface for mail delivery

What is a category for classifying graymail?

A.

Malicious

B.

Marketing

C.

Spam

D.

Priority

Which action is a valid fallback when a client certificate is unavailable during SMTP authentication on Cisco ESA?

A.

LDAP Query

B.

SMTP AUTH

C.

SMTP TLS

D.

LDAP BIND

A Cisco ESA administrator has noticed that new messages being sent to the Centralized Policy Quarantine are being released after one hour. Previously, they were being held for a day before being released.

What was configured that caused this to occur?

A.

The retention period was changed to one hour.

B.

The threshold settings were set to override the clock settings.

C.

The retention period was set to default.

D.

The threshold settings were set to default.

Which two components form the graymail management solution in Cisco ESA? (Choose two.)

A.

cloud-based unsubscribe service

B.

uniform unsubscription management interface for end users

C.

secure subscribe option for end users

D.

integrated graymail scanning engine

E.

improved mail efficacy

How does the graymail safe unsubscribe feature function?

A.

It strips the malicious content of the URI before unsubscribing.

B.

It checks the URI reputation and category and allows the content filter to take an action on it.

C.

It redirects the end user who clicks the unsubscribe button to a sandbox environment to allow a safe unsubscribe.

D.

It checks the reputation of the URI and performs the unsubscribe process on behalf of the end user.

Refer to the exhibit. What is the correct order of commands to set filter 2 to active?

A.

filters-> edit-> 2-> Active

B.

filters-> modify-> All-> Active

C.

filters-> detail-> 2-> 1

D.

filters-> set-> 2-> 1

Which two steps configure Forged Email Detection? (Choose two.)

A.

Configure a content dictionary with executive email addresses.

B.

Configure a filter to use the Forged Email Detection rule and dictionary.

C.

Configure a filter to check the Header From value against the Forged Email Detection dictionary.

D.

Enable Forged Email Detection on the Security Services page.

E.

Configure a content dictionary with friendly names.

An engineer tries to implement phishing simul-ations to test end users, but they are being blocked by the Cisco Secure Email Gateway appliance. Which two components, when added to the allow list, allow these simul-ations to bypass antispam scanning? (Choose two.)

A.

domains

B.

senders

C.

reputation score

D.

receivers

E.

spf check